US9396198B2 - Computer system, file management method and metadata server - Google Patents

Computer system, file management method and metadata server Download PDF

Info

Publication number
US9396198B2
US9396198B2 US14/003,972 US201114003972A US9396198B2 US 9396198 B2 US9396198 B2 US 9396198B2 US 201114003972 A US201114003972 A US 201114003972A US 9396198 B2 US9396198 B2 US 9396198B2
Authority
US
United States
Prior art keywords
file
server
metadata
files
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US14/003,972
Other versions
US20140040331A1 (en
Inventor
Nobumitsu Takaoka
Shoji Kodama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Assigned to HITACHI, LTD. reassignment HITACHI, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KODAMA, SHOJI, TAKAOKA, NOBUMITSU
Publication of US20140040331A1 publication Critical patent/US20140040331A1/en
Application granted granted Critical
Publication of US9396198B2 publication Critical patent/US9396198B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F17/30067
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F17/30117
    • G06F17/30194
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0605Improving or facilitating administration, e.g. storage management by facilitating the interaction with a user or administrator
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0631Configuration or reconfiguration of storage systems by allocating resources to storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Definitions

  • This invention relates to a file management method for use in a computer system including a storage apparatus, a metadata server for managing metadata of files stored in the storage apparatus, a business server for executing predetermined business processing, and an analysis server for executing analytical processing on data used by the business server.
  • business programs operating on the computers execute business logic.
  • the business programs include, for example, programs that autonomously operate, such as a document management system, and interactive programs such as a word processing program used by a user.
  • Business data required by the business program to execute the logic may be stored in the file server to flexibly perform a configuration change of a system and management of a storage capacity.
  • an analysis program operating on a computer different from the business program executes the analytical processing such as statistical processing on the business data stored in the file server to obtain information useful for business management.
  • the business program may remove a file stored in the file server in the course of the logic.
  • the analysis program obtain and analyze all files in the computer system tracing back in time, including the file removed from the file server, in order to obtain more useful information.
  • the backup system periodically reads data stored in the file server and copies the data in another storage apparatus for backup.
  • the backup system holds the same data in the file server and the storage apparatus for backup, and hence a use efficiency of storage spaces is low.
  • a method using a snapshot function of the file server there is known a method using a snapshot function of the file server.
  • the snapshot function is used so that a plurality of states of the file server at a time point in the past may be held while suppressing an amount of consumption of the storage spaces.
  • there is a limit in the number of snapshots that can be created and hence, for example, the method is not suited for an application where a file that was present at a time point tracing back in time 5 years or more is to be obtained.
  • the archive system is a system for moving a file that satisfies a predetermined condition (for example, file that has not been modified for a certain period of time) to another storage.
  • a predetermined condition for example, file that has not been modified for a certain period of time
  • the archive system deals only with files that are present in the file system, and cannot specify “removed files” as a condition, for example.
  • This invention realizes a computer system allowing all files under management of a business program, including a removed file that was present in the past, to be referenced from an analysis program without creating an extra copy.
  • a computer system comprises: a file server for managing a plurality of files; a metadata server for managing a plurality of piece of metadata of the plurality of files; and a business server for using the plurality of files to execute predetermined business processing.
  • the file server, the metadata server, and the business server is coupled to each other via a network.
  • the file server includes a first processor, a first memory coupled to the first processor, a first network interface coupled to the first processor, and a first storage medium coupled to the first processor, for storing the plurality of files.
  • the metadata server includes a second processor, a second memory coupled to the second processor, a second network interface coupled to the second processor, and a second storage medium coupled to the second processor.
  • the business server includes a third processor, a third memory coupled to the third processor, and a third network interface coupled to the third processor.
  • the metadata server is coupled to a storage apparatus including a controller and a plurality of storage media, for providing a save area for storing at least one file that is removed from the file server.
  • the second storage medium stores a metadata repository for managing at least one of the plurality of piece of metadata of the plurality of files and at least one location of one of the plurality of files stored in the save area.
  • the metadata server is configured to: store the one of the plurality of files as a saved file in the save area, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server; and store information indicating a location of the one of the plurality of files in the file server and information indicating the location of the saved file in the save area in association with each other in the metadata repository.
  • the metadata server may manage the file removed from the file server without creating the extra copy.
  • FIG. 1 is a block diagram outlining processing according to this invention
  • FIG. 2 is a block diagram illustrating a configuration of a computer system according to a first embodiment of this invention
  • FIG. 3 is a block diagram illustrating a configuration of a metadata server according to the first embodiment of this invention
  • FIG. 4 is an explanatory diagram illustrating an example of a configuration of a storage management table according to the first embodiment of this invention
  • FIG. 5 is an explanatory diagram illustrating an example of a configuration of a name space management table according to the first embodiment of this invention
  • FIG. 6 is an explanatory diagram illustrating an example of a configuration of a metadata management table according to the first embodiment of this invention
  • FIG. 7 is an explanatory diagram illustrating an example of a configuration of a saved file management table according to the first embodiment of this invention.
  • FIG. 8 is a block diagram illustrating a configuration of a file server according to the first embodiment of this invention.
  • FIG. 9 is a flowchart illustrating processing executed by a metadata management program according to the first embodiment of this invention.
  • FIG. 10 is a flowchart illustrating processing executed by a file sharing program according to the first embodiment of this invention.
  • FIGS. 11A, 11B, and 11C are flowcharts illustrating processing executed by a file removal detection program according to the first embodiment of this invention
  • FIG. 12 is an explanatory diagram illustrating the metadata management table after a file is moved according to the first embodiment of this invention.
  • FIG. 13 is an explanatory diagram illustrating the saved file management table after the file is moved according to the first embodiment of this invention
  • FIG. 14 is a flowchart illustrating processing executed by a inquiry processing program according to the first embodiment of this invention.
  • FIGS. 15A and 15B are explanatory diagrams illustrating an example of a configuration of the list according to the first embodiment of this invention.
  • FIG. 16 is a flowchart illustrating the analytical processing on files executed by an analysis program according to the first embodiment of this invention
  • FIG. 17 is an explanatory diagram illustrating an example of a configuration of a hidden file management table according to a second embodiment of this invention.
  • FIG. 18 is a flowchart illustrating processing executed by the file sharing program according to the second embodiment of this invention.
  • FIG. 19 is an explanatory diagram illustrating an example of a configuration of the saved file management table according to a third embodiment of this invention.
  • FIG. 20 is an explanatory diagram illustrating an example of a configuration of the hidden file management table according to the third embodiment of this invention.
  • FIG. 21 is a flowchart illustrating processing executed by the file sharing program according to the third embodiment of this invention.
  • FIG. 22 is a flowchart illustrating processing executed by the file removal detection program according to the third embodiment of this invention.
  • FIGS. 23 and 24 are explanatory diagrams each illustrating an example of the metadata management table according to the third embodiment of this invention.
  • FIG. 25 is an explanatory diagram illustrating an example of the saved file management table according to the third embodiment of this invention.
  • FIG. 26 is a flowchart illustrating processing executed by a file read proxy program according to the third embodiment of this invention.
  • FIG. 27 is a flowchart illustrating the details of a restoration processing according to the third embodiment of this invention.
  • FIG. 28 is an explanatory diagram illustrating an example of a configuration of the storage management table according to a fourth embodiment of this invention.
  • FIG. 29 is an explanatory diagram illustrating an example of a configuration of the name space management table according to the fourth embodiment of this invention.
  • FIG. 30 is an explanatory diagram illustrating an example of a configuration of the metadata management table according to the fourth embodiment of this invention.
  • FIG. 31 is a flowchart illustrating processing executed by the file removal detection program according to the fourth embodiment of this invention.
  • FIGS. 32A and 32B are flowcharts illustrating processing executed by the metadata management program according to a fifth embodiment of this invention.
  • this invention is outlined.
  • FIG. 1 is a block diagram outlining processing according to this invention.
  • a computer system 500 includes a metadata server 1 , a saving storage apparatus 2 , a plurality of file servers 4 , a plurality of business servers 5 , and a plurality of analysis servers 6 .
  • the business server 5 is a computer for executing a predetermined business task, and a business program 51 operates thereon.
  • the business program 51 executes the predetermined business task using files stored in the file servers 4 .
  • the business program 51 executes the predetermined business task using a file 1000 - 1 having a path name of “/A/a.doc” and a file 1000 - 2 having a path name of “/A/c.doc”.
  • the files are hereinafter referred to as files 1000 .
  • the analysis server 6 is a computer for analyzing the files 1000 , and an analysis program 61 operates thereon.
  • the analysis program 61 reads the files 1000 - 1 and 1000 - 2 used by the business program 51 and executes analytical processing such as statistical processing.
  • the metadata server 1 is a computer for managing a plurality of piece of metadata of the files stored in the plurality of file servers 4 .
  • the metadata server 1 according to this embodiment has a feature in that metadata on a file that has been removed from the file servers 4 is also managed.
  • the metadata as used herein refers to a set of attribute values set to a file.
  • the metadata includes an owner of the file, an owner group of the file, access control information, a creation date of the file, a modified date of the file, a metadata modification date of the file, a size of the file, and other user-defined attribute values.
  • the metadata server 1 manages a metadata repository in which the plurality of piece of metadata of the files is stored.
  • the metadata repository includes a field for identifying a file stored in the file server 4 , a field for identifying a file stored in the saving storage apparatus 2 , and a field indicating a status of the file.
  • the field for identifying the file stored in the file server 4 includes a path name and a storage name.
  • the field for identifying the file stored in the saving storage apparatus 2 includes a path name and a storage name.
  • the field indicating the status of the file stores information indicating whether or not the file is present in the file server 4 .
  • the business program 51 transmits to the file server 4 having an identification name of “FS1” a request to remove the file 1000 - 1 (Step S 1001 ).
  • the file server 4 suspends the removal of the file 1000 - 1 and notifies the metadata server 1 that the request to remove the file 1000 - 1 has been received (Step S 1002 ).
  • the metadata server 1 updates a record corresponding to the file 1000 - 1 stored in a metadata repository 150 (Step S 1004 ).
  • a metadata repository 150 To be specific, in the field indicating the status of the file, “removed” is stored to indicate that the file 1000 - 1 is to be removed.
  • the metadata server 1 moves the file 1000 - 1 to the saving storage apparatus 2 (Step S 1005 ).
  • the metadata server 1 obtains the file 1000 - 1 from the file server 4 and stores the file 1000 - 1 as a file 1008 in a file system 22 of the saving storage apparatus 2 .
  • the file 1008 is stored under a path name of “r/FS1/A/a.doc”. It should be noted that path names in the saving storage apparatus 2 are set so as not to overlap.
  • the metadata server 1 instructs the file server 4 to remove the file 1000 - 1 (Step S 1006 ).
  • the file server 4 removes the file 1000 - 1 and responds to the business program 51 with a completion of the removal of the file 1000 - 1 .
  • the metadata server 1 updates the record corresponding to the metadata of the file 1000 - 1 in the metadata repository 150 (Step S 1007 ).
  • the path name “r/FS1/A/a.doc” of the file 1008 and an identification name “S1” of the saving storage apparatus 2 , in which the file 1008 is stored are stored.
  • FIG. 1 illustrates a change in the metadata repository 150 before and after the removal of the file 1000 - 1 .
  • the analysis program 61 inquires of the metadata server 1 about all files including the files that are currently stored and the files that were present in the past (Step S 1011 ). To be specific, the analysis program 61 requests a list of all the files from the metadata server 1 .
  • the metadata server 1 generates the list based on the metadata repository 150 and responds to the analysis program 61 with the generated list (Step S 1012 ).
  • the list includes a plurality of entries including information for identifying the files.
  • the entry includes fields indicating the path name of the file, an identification name of a stored storage apparatus, the metadata of the file in the file server 4 , and a status of the file.
  • the entry of the file 1000 - 1 removed from the file server 4 further includes the saved path name of the file and the identification name of the saving storage apparatus 2 . Moreover, the field indicating the status of the file of the entry stores information indicating that the file has been removed.
  • the analysis program 61 identifies locations of the files based on the list obtained from the metadata server 1 .
  • the analysis program 61 finds that two files having the path names of “/A/a.doc” and “/A/c.doc” have been present in the file server 4 . Further, the analysis program 61 finds that, of the above-mentioned files, the file having the path name of “/A/a.doc” has been removed from the file server 4 and stored as the file 1008 having the path name of “r/FS1/A/a.doc” in the saving storage apparatus 2 having the identification name of “S1”.
  • the analysis program 61 refers to the list to obtain all the files required for the analytical processing (Steps S 1013 and S 1014 ). In other words, the analysis program 61 obtains from the file server 4 the file 1000 - 2 stored in the file server 4 and obtains from the saving storage apparatus 2 the file 1008 corresponding to the file 1000 - 1 that has been removed from the file server 4 .
  • the metadata server 1 may manage files that have been removed by the business program 51 during the execution of the business task so as to be analyzable by the analysis program 61 .
  • the file in a case where a file is to be removed from the file server 4 , the file is moved to the saving storage apparatus 2 before being removed from the file server 4 , and hence an unnecessary copy of the file is not created.
  • a file that is removed from the file server 4 and may be inquired of the metadata server 1 to obtain its content as with the file 1000 - 1 is hereinafter referred to as a removed file.
  • a copy of the removed file stored in the saving storage apparatus is referred to as a saved file.
  • the file that is to be removed and has been stored in the file server 4 before becoming the removed file is referred to as an original file.
  • a file that is stored in the file server 4 and has not been removed is referred to as a normal file.
  • FIG. 2 is a block diagram illustrating a configuration of the computer system 500 according to a first embodiment of this invention.
  • the computer system 500 includes the metadata server 1 , the saving storage apparatus 2 , a backup storage apparatus 3 , the plurality of file servers 4 , the plurality of business servers 5 , the plurality of analysis servers 6 , and a network 7 .
  • the metadata server 1 , the saving storage apparatus 2 , the backup storage apparatus 3 , the file servers 4 , the business servers 5 , and the analysis servers 6 may communicate with each other via the network 7 .
  • the network 7 may be constituted by using a local area network (LAN), a wide area network (WAN), the Internet, or the like. This invention is not limited to a coupling system of the network 7 .
  • the metadata server 1 is a computer for managing the metadata. It should be noted that the metadata server 1 may be a virtual machine generated by using a virtualization technology.
  • the metadata server 1 includes a metadata server program 110 and the metadata repository 150 .
  • the other components are described later.
  • the saving storage apparatus 2 is a storage apparatus for storing various files.
  • the storage apparatus refers to an apparatus that includes a controller (not shown), a network interface (not shown), and one or more storage media (not shown) and is capable of providing storage spaces of the storage media to a computer.
  • the storage apparatus may use a plurality of storage media to constitute a redundant array of inexpensive disks (RAID), and further may use a physical storage space to generate a plurality of logical storage spaces.
  • the storage apparatus may construct a different file system for each of the logical storage spaces.
  • the saving storage apparatus 2 includes a file sharing program 21 and the file system 22 .
  • the file sharing program 21 stores a file in the file system 22 and reads the file from the file system 22 in accordance with a file access request received from the metadata server 1 via the network 7 .
  • the other components are described later.
  • the backup storage apparatus 3 is a storage apparatus for storing various files. It should be noted, however, that the backup storage apparatus 3 is used especially for the purpose of backing up the files.
  • the backup storage apparatus 3 includes a backup program 31 and a file system 32 . The other components are described later.
  • the file server 4 is a computer for storing various files and managing the files.
  • the file server 4 stores files required by the business program 51 to execute business processing.
  • the file server 4 includes a file sharing program 411 and a file system 452 . The other components are described later.
  • the file server 4 is also recognized as a type of storage apparatus.
  • the business server 5 is a computer for executing a program required to realize the business processing. It should be noted that the business server 5 may be a virtual machine generated by using the virtualization technology.
  • the business server 5 includes the business program 51 .
  • the business program 51 is a program for performing specified business processing, and obtains data required for the business processing from the file server 4 to execute the predetermined business processing. The other components are described later.
  • the analysis server 6 is a computer for executing a program required to realize the analytical processing. It should be noted that the analysis server 6 may be a virtual machine generated by using the virtualization technology.
  • the analysis server 6 includes the analysis program 61 .
  • the analysis program 61 reads a file stored in the file server 4 and used by the business program 51 for the business processing, and uses the read file to execute the analytical processing.
  • FIG. 3 is a block diagram illustrating a configuration of the metadata server 1 according to the first embodiment of this invention.
  • the metadata server 1 includes a memory 11 , a processor 12 , a network interface 13 , and a local storage 15 , and the components are connected to each other via an internal bus 16 .
  • the processor 12 executes programs stored in the memory 11 .
  • the processor 12 executes the programs so that functions of the metadata server 1 may be realized.
  • the memory 11 stores the metadata server program 110 .
  • the metadata server program 110 is a program for realizing the functions of the metadata server 1 , and includes a plurality of subprograms.
  • the metadata server program 110 includes an inquiry processing program 111 , a metadata management program 112 , a file removal detection program 113 , a file save program 114 , and a file read proxy program 115 .
  • the inquiry processing program 111 is a program for executing processing on inquiries from the file server 4 and the analysis server 6 .
  • the metadata management program 112 is a program for managing the metadata.
  • the file removal detection program 113 is a program for detecting that a file is to be removed from the file server 4 .
  • the file save program 114 is a program for copying the file to the saving storage apparatus 2 .
  • the file read proxy program 115 is a program for reading the file from the saving storage apparatus 2 .
  • Each of the above-mentioned subprograms may be executed as an independent process or as a partial program such as a library constituting the metadata server program 110 . It should be noted that details of the processing executed by the subprograms are described later with reference to the figures.
  • the memory 11 also stores a list 116 generated when an inquiry from the analysis server 6 is received.
  • the list 116 stores information required to obtain files from the file server 4 or the saving storage apparatus 2 .
  • the local storage 15 is a storage medium of the metadata server 1 , and may include a hard disk drive (HDD), a solid state drive (SSD), and a non-volatile memory (NVRAM).
  • HDD hard disk drive
  • SSD solid state drive
  • NVRAM non-volatile memory
  • the local storage 15 stores the metadata repository 150 . It should be noted that the metadata repository 150 may be stored in the memory 11 or in a storage apparatus coupled to the metadata server 1 .
  • the metadata repository 150 includes a storage management table 151 , a name space management table 152 , a metadata management table 153 , and a saved file management table 154 . In the following, configurations of the tables are described.
  • FIG. 4 is an explanatory diagram illustrating an example of a configuration of the storage management table 151 according to the first embodiment of this invention.
  • the storage management table 151 stores information on storage apparatus managed by the metadata server 1 .
  • the storage management table 151 includes one or more records, and each of the records includes a storage ID 1511 , a storage name 1512 , a type 1513 , and an IP address 1514 .
  • Each record of the storage management table 151 corresponds to one storage apparatus managed by the metadata server 1 .
  • the storage ID 1511 stores an identifier used by the metadata server 1 to uniquely identify the storage apparatus.
  • the storage name 1512 stores an identification name set to the storage apparatus in the computer system 500 .
  • the type 1513 stores a type of usage of the storage apparatus.
  • “file server” is stored in a case where the storage apparatus is the file server 4
  • “archive storage” is stored in a case of a storage apparatus for storing archive files.
  • the IP address 1514 stores an IP address assigned to the storage apparatus.
  • the first record stores information on a file server 4 having the storage ID 1511 of “s1000”, the storage name 1512 of “FS1”, the type 1513 of “file server”, and the IP address 1514 of “192.168.10.100”.
  • the second record stores information on a file server 4
  • the third record stores information on a saving storage apparatus 2 .
  • FIG. 5 is an explanatory diagram illustrating an example of a configuration of the name space management table 152 according to the first embodiment of this invention.
  • the name space management table 152 stores information on name spaces in the storage apparatus managed by the metadata server 1 .
  • the name space as used herein is a logical unit for identifying a storage space in which the file is stored.
  • a name such as a share name or a public name is known to correspond to the name space.
  • a similar concept is also known for the case of the saving storage apparatus 2 .
  • the name space management table 152 includes one or more records, and each of the records includes a name space ID 1521 , a name space name 1522 , a storage ID 1523 , a capacity 1524 , a protocol 1525 , a used volume 1526 , and a usage 1527 .
  • Each record of the name space management table 152 corresponds to a name space in the file server 4 or the saving storage apparatus 2 .
  • the name space ID 1521 stores an identifier used by the metadata server 1 to uniquely identify the name space.
  • the name space name 1522 stores a name used by the storage apparatus to uniquely identify the name space.
  • the storage ID 1523 stores an identifier of a storage apparatus providing a logical storage space corresponding to the name space. It should be noted that the storage ID 1523 is the same as the storage ID 1511 .
  • the capacity 1524 stores a capacity of the logical storage space corresponding to the name space.
  • the protocol 1525 stores a protocol used to access the logical storage space corresponding to the name space.
  • the used volume 1526 stores a used volume of the logical storage space corresponding to the name space.
  • the usage 1527 stores a usage of the logical storage space corresponding to the name space. For example, “primary” is stored in a case of a logical storage space used by the business program 51 . Moreover, “saved” is stored in a case of a logical storage space storing saved files.
  • the first and second records store information on name spaces on the file server 4 having the storage ID 1523 of “s1000”.
  • the first record stores “n1001” in the name space ID 1521 , “share1” in the name space name 1522 , “s1000” in the storage ID 1523 , “20 TB” in the capacity 1524 , “nfs” in the protocol 1525 , “5 TB” in the used volume 1526 , and “primary” in the usage 1527 .
  • the second record stores information on a name space having the name space name 1522 or a share name of “share2”.
  • the third record stores information on a name space of another file server 4 having the name space name 1522 or a share name of “share3”.
  • the fourth record stores information on a name space of a saving storage apparatus 2 having the name space name 1522 of “r”.
  • FIG. 6 is an explanatory diagram illustrating an example of a configuration of the metadata management table 153 according to the first embodiment of this invention.
  • the metadata management table 153 stores information indicating locations of files and metadata.
  • the metadata management table 153 includes one or more records, and each of the records includes a metadata ID 1531 , a path 1532 , a name space ID 1533 , original metadata 1534 , and a file status 1535 .
  • Each record of the metadata management table 153 corresponds to a file stored in the file server 4 or a removed file.
  • the metadata ID 1531 stores an identifier for identifying the metadata.
  • the path 1532 stores a path name indicating a location at which the file is stored.
  • the name space ID 1533 stores an identifier for identifying a name space of a logical storage space in which the file is stored.
  • the name space ID 1533 is the same as the name space ID 1521 .
  • the original metadata 1534 stores metadata (not shown) in the file server 4 .
  • the file status 1535 stores information indicating whether or not the file is present in the file server 4 .
  • “present” is stored in a case where the file is present in the file server 4
  • “removed” is stored in a case where the file is not present in the file server 4 .
  • a record having “present” stored in the file status 1535 indicates that a file corresponding to the record is stored at the location indicated by the path 1532 and the name space ID 1533 .
  • a record having “removed” stored in the file status 1535 indicates that a file corresponding to the record is not currently stored at the location indicated by the path 1532 and the name space ID 1533 , and is currently a removed file.
  • the metadata of the file is managed by the file server 4 for each of the files, and the metadata server 1 may obtain the metadata from the file server 4 through an application programming interface (API) provided for each type of name space.
  • API application programming interface
  • the metadata management table 153 stores three records. It should be noted that the number of records is merely an example and is not intended to limit this invention. In other words, the metadata management table 153 stores records corresponding to the metadata of all the files managed by the metadata server 1 .
  • the first record represents metadata corresponding to the file “/share1/a.doc” stored in the name space “share1” of the file server 4 , and stores “100” in the metadata ID 1531 .
  • the first record stores in the path 1532 “/share1/a.doc”, which is a path name of the corresponding file, and stores in the name space ID 1533 “n1001”, which is an identifier of the name space “share1”. Moreover, the first record stores in the original metadata 1534 the metadata of the corresponding file in the file server 4 , which is not shown here. Further, the first record stores “present” in the file status 1535 .
  • the second record represents metadata corresponding to the file “/share1/b.doc” stored in the name space “share1” of the file server 4 , and stores “110” in the metadata ID 1531 . Moreover, the second record stores “removed” in the file status 1535 . Therefore, the second record represents that the file “/share1/b.doc” is not currently stored at the location indicated by the path 1532 and the name space ID 1533 , and is a removed file.
  • the third record represents metadata corresponding to the file “/share1/c.doc” stored in the name space “share1” of the file server 4 , and stores “120” in the metadata ID 1531 .
  • FIG. 7 is an explanatory diagram illustrating an example of a configuration of the saved file management table 154 according to the first embodiment of this invention.
  • the saved file management table 154 stores information on locations (save destinations) of saved files.
  • the saved file management table 154 includes one or more records, and each of the records includes a metadata ID 1541 , a saved path 1542 , and a saved name space ID 1543 .
  • Each record of the saved file management table 154 corresponds to a saved file stored in the saving storage apparatus 2 .
  • the metadata server 1 updates the saved file management table 154 , in a case of detecting a file is to be removed from the file server 4 , and being moved the file to the saving storage apparatus 2 .
  • the metadata ID 1541 stores an identifier for identifying the metadata.
  • the metadata ID 1541 is the same as the metadata ID 1531 .
  • the saved path 1542 stores the path name indicating the location at which the saved file is stored.
  • the saved name space ID 1543 stores an identifier for identifying a name space in which the saved file is stored.
  • the first record stores information on a saved file corresponding to the file “/share1/b.doc” in FIG. 6 .
  • the metadata ID 1541 stores the identifier “110” of the metadata corresponding to the file “/share1/b.doc”.
  • the saved path 1542 stores a path name “/r/FS1/share1/b.doc” of a location of the saved file corresponding to the file “/share1/b.doc”.
  • the saved name space ID 1543 stores an identifier “n3001” of a name space in which the saved file “/r/FS1/share1/b.doc” is stored.
  • FIG. 8 is a block diagram illustrating the configuration of the file server 4 according to the first embodiment of this invention.
  • the file server 4 includes a memory 41 , a processor 42 , a network interface 43 , and a storage interface 44 , and is coupled to a storage apparatus 45 .
  • the processor 42 executes programs stored in the memory 41 .
  • the processor 42 executes the programs so that functions of the file server 4 may be realized.
  • the memory 41 stores the file sharing program 411 , a file system program 412 , and a storage input/output program 413 .
  • the file sharing program 411 is a program for providing a function for the business program 51 , the analysis program 61 , and the metadata server program 110 to access a file stored in the storage apparatus 45 via the network 7 .
  • the file system program 412 is a program for configuring the file system for storing the file in the storage apparatus 45 and managing input/output of the file.
  • the storage input/output program 413 is a program for managing read processing and write processing of data with respect to the storage apparatus 45 .
  • the processor 42 executes the above-mentioned programs so that the file server 4 realizes a file sharing function via the network 7 .
  • the storage apparatus 45 generates a storage volume 451 therein.
  • the storage volume 451 is constituted of a storage space of a storage medium such as a hard disk drive, a solid state drive, or a non-volatile memory of the storage apparatus 45 .
  • the storage volume 451 includes two name spaces 452 - 1 and 452 - 2 . “share1” is set as an identification name to the name space 452 - 1 , and “share1” is set as an identification name to the name space 452 - 2 .
  • the name spaces 452 - 1 and 452 - 2 include data areas 453 - 1 and 453 - 2 and hidden file storage areas 454 - 1 and 454 - 2 , respectively.
  • the data areas 453 - 1 and 453 - 2 are areas for storing files that can be referenced by the business program 51 .
  • the hidden file storage areas 454 - 1 and 454 - 2 are areas for temporarily storing files removed by the business program 51 .
  • the files stored in the hidden file storage areas 454 - 1 and 454 - 2 are treated as files that are not present by the business program 51 . In other words, the business program 51 cannot recognize the files stored in the hidden file storage areas 454 - 1 and 454 - 2 .
  • the data areas 453 - 1 and 453 - 2 and the hidden file storage areas 454 - 1 and 454 - 2 may be included in different storage volumes 451 , or may each be one directory in a single file system tree.
  • the name spaces 452 - 1 and 452 - 2 may be included in different storage volumes 451 , or may each be one directory in a single file system tree.
  • the two name spaces are defined in the storage volume 451 .
  • this invention is not limited thereto, and two or more name spaces may be defined.
  • the data areas 453 - 1 and 453 - 2 are hereinafter represented as data areas 453 .
  • the hidden file storage areas 454 - 1 and 454 - 2 are represented as hidden file storage areas 454 .
  • FIG. 9 is a flowchart illustrating processing executed by the metadata management program 112 according to the first embodiment of this invention.
  • the metadata management program 112 executes this processing periodically or in accordance with a user's request in order to update the metadata repository 150 .
  • the metadata management program 112 refers to the name space management table 152 to select one name space to be processed (Step S 8001 ).
  • the metadata management program 112 selects one file to be processed from among files stored in the selected name space (Step S 8002 ).
  • the metadata management program 112 obtains metadata of the file to be processed from the file server 4 (Step S 8003 ).
  • the metadata management program 112 updates the metadata management table 153 based on the obtained metadata (Step S 8004 ). To be specific, the following processing is executed.
  • the metadata management program 112 determines whether or not a record corresponding to the selected file is registered. To be specific, the metadata management program 112 determines whether or not there is a record having the path 1532 and the name space ID 1533 that match the identifier of the name space to be processed and the path name of the file to be processed.
  • a method of determining whether or not the obtained metadata and the original metadata match may be employed.
  • an i-node number which is identification information of the file in the file server 4 , may be used.
  • the metadata management program 112 registers a new record with the metadata management table 153 . At this time, the metadata management program 112 generates an identifier for uniquely identifying the metadata and stores the generated identifier in the metadata ID 1531 .
  • the metadata management program 112 stores in the path 1532 the path name of the file to be processed in the selected name space, and stores the identifier of the selected name space in the name space ID 1533 .
  • the metadata management program 112 also stores the obtained metadata in the original metadata 1534 , and stores “present” in the file status 1535 .
  • the metadata management program 112 stores the obtained metadata in the original metadata 1534 of the existing record.
  • the metadata management program 112 determines whether or not the processing is complete for all the files stored in the name space to be processed (Step S 8005 ).
  • Step S 8002 the metadata management program 112 returns to Step S 8002 and executes similar processing (Steps S 8002 to S 8005 ).
  • the metadata management program 112 determines whether or not the processing is complete for all the name spaces under its management (Step S 8006 ).
  • Step S 8001 the metadata management program 112 returns to Step S 8001 and executes similar processing (Steps S 8001 to S 8006 ).
  • the metadata management program 112 ends the processing (Step S 8007 ).
  • FIG. 10 is a flowchart illustrating processing executed by the file sharing program 411 according to the first embodiment of this invention.
  • the file server 4 executes the following processing, in a case where an access request to a file is received from the business program 51 or another program.
  • the file sharing program 411 receives an access request to a predetermined file from the business program 51 or another program via the network 7 (Step S 8101 ).
  • the file sharing program 411 determines whether or not the received access request is a request to remove the file (Step S 8102 ).
  • the file sharing program 411 instructs the file system program 412 to execute processing in accordance with the received access request (Step S 8105 ). Thereafter, the file sharing program 411 transmits a response to the program that has transmitted the access request, and ends the processing (Step S 8106 ).
  • the file sharing program 411 notifies the file removal detection program 113 of the metadata server 1 that the access request including the request to remove the file has been received (Step S 8103 ).
  • the notification that the access request that requests the removal of the file has been received is hereinafter represented as a removal notification.
  • the file requested for removal by the business program 51 or another program is referred to as a file to be removed.
  • the file to be removed is moved to the saving storage apparatus 2 by the metadata server 1 in the end. In a case where the file to be removed is moved to the saving storage apparatus 2 and “removed” is stored in the file status 1535 of the metadata management table 153 , the file becomes a removed file.
  • the removal notification includes information such as the path name of the file to be removed, a name space in which the file to be removed is stored, the identification name of the file server, and metadata of the file to be removed.
  • the file sharing program 411 executes processing on the file to be removed in accordance with the response (Step S 8104 ).
  • the response transmitted from the file removal detection program 113 includes an instruction from the file save program 114 . To be specific, the following processing is executed.
  • the file sharing program 411 moves the file to be removed to the hidden file storage area 454 . This disables the business program 51 from accessing the file to be removed. In other words, the file is recognized by the business program 51 as having been removed.
  • the file sharing program 411 removes the file to be removed.
  • file sharing program 411 outputs the instructions to the file system program 412 to realize the moving processing and the removal processing of the file to be removed.
  • the file to be removed stored in the hidden file storage area 454 is referred to as a hidden file.
  • the file sharing program 411 ends the processing (Step S 8106 ).
  • the file sharing program 411 executes the processing, but the processing may be executed by another program such as the file system program 412 .
  • FIGS. 11A, 11B, and 11C are flowcharts illustrating processing executed by the file removal detection program 113 according to the first embodiment of this invention.
  • the file removal detection program 113 detects that a file is to be removed from the file server 4 (Step S 8201 ). The file removal detection program 113 recognizes the file as a file to be removed.
  • the file removal detection program 113 may detect that the file is to be removed from the file server 4 by receiving the removal notification from the file sharing program 411 (see Step S 8103 ). It should be noted that the notification includes the path name of the file to be removed, the name space name, the metadata, and the like.
  • the file removal detection program 113 updates a record corresponding to the file to be removed of the metadata management table 153 (Step S 8202 ).
  • the file removal detection program 113 refers to the metadata management table 153 based on the information included in the received removal notification to identify the record corresponding to the file to be removed, and stores “removed” in the file status 1535 of the record.
  • the file removal detection program 113 executes file hiding processing on the file to be removed for the file server 4 (Step S 8203 ). In the file hiding processing, the following processing is executed.
  • the file removal detection program 113 instructs the file server 4 that has transmitted the removal notification to execute the hiding processing on the file to be removed (Step S 8204 ).
  • the file sharing program 411 of the file server 4 moves the file to be removed to the hidden file storage area 454 .
  • the removed file is treated as a hidden file.
  • a path name of the hidden file may be automatically determined by the file sharing program 411 or the file system program 412 , or may be automatically determined by the file removal detection program 113 .
  • Step S 8205 the file removal detection program 113 updates the saved file management table 154 (Step S 8205 ). To be specific, the following processing is executed.
  • the file removal detection program 113 adds a new record to the saved file management table 154 , and stores the metadata ID 1531 of the record corresponding to the file to be removed in the metadata ID 1541 of the record.
  • the file removal detection program 113 stores the path name of the hidden file in the saved path 1542 , and stores in the saved name space ID 1543 an identifier of a name space in which the hidden file is stored.
  • the file removal detection program 113 executes the save processing on the hidden file (Step S 8206 ), and ends the processing (Step S 8210 ).
  • the save processing on the hidden file the following processing is executed.
  • the file removal detection program 113 calls the file save program 114 , and instructs the file save program 114 to execute the save processing on the hidden file.
  • the file save program 114 copies the hidden file in the name space on the saving storage apparatus 2 (Step S 8207 ).
  • the copied file becomes a saved file.
  • a path name that is unique in the name space in which the saved file is stored is determined.
  • the file save program 114 provides a notification of completion of the save processing on the hidden file along with the information on the saved file.
  • the file removal detection program 113 updates the saved file management table 154 based on the information included in the received completion notification (Step S 8208 ).
  • the file removal detection program 113 stores the path name of the saved file in the saved path 1542 of the record added in Step S 8205 , and stores in the saved name space ID 1543 an identifier of a name space in which the saved file is stored.
  • the file removal detection program 113 instructs the file server 4 to remove the hidden file (Step S 8209 ).
  • the file server 4 removes the hidden file from the name space corresponding to the hidden file storage area 454 .
  • the file server 4 may periodically inquire of the metadata server 1 whether or not there is a file to be removed. In this case, the file removal detection program 113 may not provide the instruction to remove the hidden file.
  • FIG. 12 is an explanatory diagram illustrating the metadata management table 153 after the file is moved according to the first embodiment of this invention.
  • FIG. 13 is an explanatory diagram illustrating the saved file management table 154 after the file is moved according to the first embodiment of this invention.
  • FIGS. 6 and 12 When FIGS. 6 and 12 are compared, it can be seen that the file status 1535 of the first record corresponding to the file “share1/a.doc” has been changed from “present” to “removed”. This means that the file “share1/a.doc” has become the removed file.
  • the second record is newly added to the saved file management table 154 .
  • the second record stores “100” in the metadata ID 1541 . Therefore, it can be seen that the second record is a record storing information on the file for which the identifier of the metadata is “100”, that is, a saved file corresponding to the file “share1/a.doc”.
  • the path name of the saved file corresponding to the file “share1/a.doc” is “r/FS1/share1/a.doc”, and that the name space is identified by the saved name space ID 1543 of “n3001”, that is, the name space “r” of the saving storage apparatus 2 .
  • FIG. 14 is a flowchart illustrating processing executed by the inquiry processing program 111 according to the first embodiment of this invention.
  • the inquiry processing program 111 executes processing, in a case where requested by the analysis program 61 to output a list of the files managed by the metadata server 1 .
  • the inquiry processing program 111 receives an inquiry about the files from the analysis program 61 (Step S 8301 ).
  • the inquiry may include conditions on the files to be output.
  • the conditions may include, for example, files including a particular character string in the path name, files modified in a particular period of time, files of a particular owner, files to which a particular access right is set, files stored in a particular file server or name space, files that were stored in the particular file server or name space, or the like.
  • conditions on the removed file may be specified, such as being a removed file, not being a removed file, both of removed files and files that are not removed files.
  • a logical disjunction or a logical conjunction of sets of the files satisfying the above-mentioned conditions may also be specified.
  • the inquiry processing program 111 refers to the metadata repository 150 to generate the list 116 of the files satisfying the specified conditions on the memory 11 (Step S 8302 ). To be specific, the inquiry processing program 111 refers to the storage management table 151 , the name space management table 152 , and the metadata management table 153 to generate the list 116 .
  • FIGS. 15A and 15B are explanatory diagrams illustrating an example of a configuration of the list 116 according to the first embodiment of this invention.
  • the list 116 stores information on the files managed by the metadata server 1 .
  • the list 116 includes a metadata ID 1161 , a path 1162 , original metadata 1163 , a storage ID 1164 , an IP address 1165 , a name space ID 1166 , a file status 1167 , and save destination information 1168 .
  • the metadata ID 1161 stores an identifier for identifying metadata.
  • the metadata ID 1161 is the same as the metadata ID 1531 .
  • the path 1162 stores a path indicating the location at which the file is stored.
  • the path 1162 is the same as the path 1532 .
  • the original metadata 1163 stores the metadata of the file.
  • the original metadata 1163 is the same as the original metadata 1153 .
  • the storage ID 1164 stores an identifier of a storage apparatus in which the file is stored.
  • the storage ID 1164 is the same as the storage ID 1511 .
  • the IP address 1165 stores an assigned IP address of the storage apparatus.
  • the IP address 1165 is the same as the IP address 1514 .
  • the name space ID 1166 stores an identifier used by the metadata server 1 to uniquely identify a name space.
  • the name space ID 1166 is the same as the name space ID 1521 .
  • the file status 1167 stores information indicating whether or not the file is present in the file server 4 .
  • the file status 1167 is the same as the file status 1535 .
  • the save destination information 1168 stores information on a saved file. It should be noted that the save destination information 1168 does not store the information, in a case where the file is not a saved file.
  • the save destination information 1168 includes a saved path 11681 , a storage ID 11682 , an IP address 11683 , and a saved name space ID 11684 .
  • the saved path 11681 stores a path indicating the location at which the saved file is stored.
  • the saved path 11681 is the same as the saved path 1542 .
  • the storage ID 11682 stores an identifier of the storage apparatus in which the saved file is stored.
  • the storage ID 11682 is the same as the storage ID 1511 .
  • the IP address 11683 stores an assigned IP address of the storage apparatus in which the saved file is stored.
  • the IP address 11683 is the same as the IP address 1514 .
  • the saved name space ID 11684 stores an identifier for identifying the name space in which the saved file is stored.
  • the saved name space ID 11684 is the same as the saved name space ID 1543 .
  • Step S 8302 information is stored in the metadata ID 1161 , the path 1162 , the original metadata 1163 , the storage ID 1164 , the IP address 1165 , the name space ID 1166 , and the file status 1167 .
  • the inquiry processing program 111 selects one entry corresponding to the removed file from the generated list (Step S 8303 ). To be specific, the inquiry processing program 111 selects an entry storing “removed” in the file status 1167 . It should be noted that a method of selecting an entry in order from the top may be contemplated, in a case where there are a plurality of entries corresponding to removed files.
  • the inquiry processing program 111 refers to the saved file management table 154 to obtain information on a save destination of the removed file corresponding to the selected entry (Step S 8304 ).
  • the inquiry processing program 111 identifies a record that matches the metadata ID 1161 of the selected entry from the saved file management table 154 .
  • the inquiry processing program 111 obtains the saved path 1542 and the saved name space ID 1543 from the identified record. Further, the inquiry processing program 111 uses the saved name space ID 1543 to obtain from the storage management table 151 and the name space management table 152 the identification name, the IP address, and the identification name of the name space of the saving storage apparatus 2 in which the saved file is stored.
  • Step S 8304 based on the information obtained in Step S 8304 , the inquiry processing program 111 updates the list 116 (Step S 8305 ). To be specific, the information obtained in Step S 8304 is stored in the save destination information 1169 of the selected entry.
  • the inquiry processing program 111 determines whether or not the processing is complete for entries corresponding to all the removed files included in the list 116 (Step S 8306 ).
  • the inquiry processing program 111 returns to Step S 8303 and executes similar processing (Steps S 8303 to S 8306 ).
  • the inquiry processing program 111 transmits the generated list 116 to the analysis program 61 which has transmitted the request to output the file list, and ends the processing (Steps S 8307 and S 8308 ).
  • FIG. 16 is a flowchart illustrating the analytical processing on files executed by the analysis program 61 according to the first embodiment of this invention.
  • the analysis program 61 executes the analytical processing periodically or in accordance with a user's instruction.
  • the analysis program 61 transmits to the inquiry processing program 111 of the metadata server 1 an inquiry about files stored in all the file servers 4 (Step S 8401 ).
  • the output request may include conditions on the files to be included in the list 116 .
  • the analysis program 61 waits for a response from the metadata server 1 . In other words, the analysis program 61 suspends the processing until the list 116 is transmitted from the metadata server 1 .
  • the analysis program 61 selects one entry to be processed from the received list 116 (Step S 8402 ). For example, a method of selecting an entry in order from the top of the list 116 may be contemplated.
  • the analysis program 61 obtains, based on the entry to be processed, information on a read location of the file corresponding to the entry (Step S 8403 ). To be specific, the following processing is executed.
  • the analysis program 61 determines whether or not “removed” is stored in the file status 1167 of the selected entry. In a case where “removed” is stored in the file status 1167 , it can be seen that the selected entry is an entry on a removed file.
  • the analysis program 61 obtains information stored in the save destination information 1168 .
  • the saved path 11681 , the storage ID 11682 , the IP address 11683 , and the saved name space ID 11684 are obtained.
  • the analysis program 61 obtains the path 1162 , the storage ID 1164 , the IP address 1165 , and the name space ID 1166 .
  • Step S 8403 This concludes the processing of Step S 8403 .
  • Step S 8404 the analysis program 61 reads the file corresponding to the selected entry from the storage apparatus as the read location.
  • the analysis program 61 executes predetermined analytical processing based on the content of the read file and the original metadata 1163 of the selected entry (Step S 8405 ).
  • the analysis program 61 determines whether or not the processing is complete for all the entries in the obtained list 116 (Step S 8406 ).
  • Step S 8402 the analysis program 61 returns to Step S 8402 and executes similar processing (Steps S 8402 to S 8406 ).
  • the analysis program 61 ends the analytical processing (Step S 8407 ).
  • the storage apparatus in which the file is stored may be a storage apparatus that cannot be accessed by the analysis program 61 . This applies, for example, to a case where a file sharing protocol for reading the file is not supported in the analysis program 61 .
  • the analysis program 61 transmits a read request for a desired file to the file read proxy program 115 .
  • the file read proxy program 115 reads the file from the storage apparatus as proxy for the analysis program 61 , and responds to the analysis program 61 with the read file.
  • the file server 4 in a case of receiving from the business program 51 the request to remove a file, transmits the removal notification of the file to the metadata server 1 in the course of the processing. Thereafter, the file server 4 executes the hiding processing in accordance with the instruction of the metadata server 1 .
  • the second embodiment is different in that the file server 4 transmits removal notifications of a plurality of files to the metadata server 1 at one time, in a case where requests to remove a certain number of files are received from the business program 51 or in a case where a certain period of time has elapsed since the removal notification is transmitted. Moreover, in the second embodiment, in order to transmit the removal notifications of the plurality of files at one time, in a case where a request to remove a file is received, the file server 4 automatically executes the hiding processing on the file without waiting for an instruction from the metadata server 1 .
  • the components of the computer system 500 , the components of the metadata server 1 , and the tables managed by the metadata server 1 in the second embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted.
  • the file server 4 in the second embodiment is different from the file server 4 in the first embodiment in that the memory 41 newly includes a hidden file management table 415 (not shown).
  • the other components are the same as those of the first embodiment, and hence descriptions thereof are omitted.
  • FIG. 17 is an explanatory diagram illustrating an example of a configuration of the hidden file management table 415 according to the second embodiment of this invention.
  • the hidden file management table 415 stores information on hidden files.
  • the hidden file management table 415 includes a path 4151 , a name space ID 4152 , original metadata 4153 , and a hidden file path 4154 .
  • the path 4151 stores the path name of the file before the hiding processing is executed.
  • the name space ID 4152 stores the identification name of the name space in which the file was stored before the hiding processing is executed.
  • the original metadata 4153 stores the metadata of the file before the hiding processing is executed.
  • the hidden file path 4154 stores the path name of the hidden file.
  • FIG. 18 is a flowchart illustrating processing executed by the file sharing program 411 according to the second embodiment of this invention.
  • the file sharing program 411 receives an access request to a predetermined file from the business program 51 or another program via the network 7 (Step S 8601 ).
  • the file sharing program 411 determines whether or not the received access request is a request to remove the file (Step S 8602 ).
  • the file sharing program 411 instructs the file system program 412 to execute processing in accordance with the received access request (Step S 8607 ). Thereafter, the file sharing program 411 transmits a response to the program that has transmitted the access request, and ends the processing (Step S 8608 ).
  • the file sharing program 411 moves the file to be removed to the hidden file storage area 454 (Step S 8603 ).
  • the file to be removed is recognized by the business program 51 as having been removed.
  • the file sharing program 411 updates the hidden file management table 415 (Step S 8604 ). In other words, the file sharing program 411 stores the information on the hidden file in the hidden file management table 415 .
  • the file sharing program 411 generates a new record, and stores in the generated record the path name, the identification name of the name space, and the metadata under which the file to be removed was stored before being moved to the hidden file storage area 454 , and the path name of the hidden file.
  • the path name of the hidden file is determined by the file sharing program 411 so as not to overlap in the hidden file management table 415 .
  • the file sharing program 411 determines whether or not the removal notification of the file needs to be transmitted to the metadata server 1 (Step S 8605 ). For example, in a case where a preset certain number of records or more are registered with the hidden file management table 415 , or in a case where a preset period of time has elapsed from the last removal notification, the file sharing program 411 determines that the removal notification of the file needs to be transmitted.
  • the file sharing program 411 ends the processing (Step S 8608 ).
  • the file sharing program 411 transmits the removal notification of the file to the metadata server 1 (Step S 8606 ).
  • the notification includes information on all records stored in the hidden file management table 415 , that is, information on all hidden files. Thereafter, the file sharing program 411 ends the processing (Step S 8608 ).
  • Steps S 8605 and S 8606 is executed in the course of the processing in response to the access request from the business program 51 , but the two processing steps may be periodically executed as processing independent of the processing in response to the access request.
  • the file removal detection program 113 executes the processing illustrated in FIG. 11 . It should be noted, however, that when the removal notification is received, the removed file is hidden by the file server 4 , and hence the processing of Step S 8203 is not executed.
  • the third embodiment has a feature in that the second embodiment is extended to manage, in addition to the removed file, data to be partially erased from a file due to overwrite on the file, a change in size of the file, or the like so as to be readable by the analysis program 61 .
  • erased data The data to be erased due to removal of the file, the overwrite on the file, or truncation of the file size is hereinafter referred to as erased data.
  • a file that cannot be read from the file server 4 because the erased data is generated by the above-mentioned processing but can be obtained by inquiring of the metadata server 1 is referred to as the removed file.
  • the file from which a part of data is erased due to the overwrite on the file or the truncation of the file size is referred to as a partially erased file.
  • the file on the file server 4 in which the erased data was stored is referred to as an original file.
  • a file for saving the erased data is referred to as a saved file.
  • One saved file stores erased data generated in processing of one access.
  • the components of the computer system 500 and the components of the metadata server 1 in the third embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. Moreover, the components of the file server 4 in the third embodiment are the same as those of the second embodiment, and hence descriptions thereof are omitted.
  • the third embodiment is different in the saved file management table 154 included in the metadata server 1 and the hidden file management table 415 included in the file server 4 .
  • FIG. 19 is an explanatory diagram illustrating an example of a configuration of the saved file management table 154 according to the third embodiment of this invention.
  • the saved file management table 154 in the third embodiment is stored in the memory 11 of the metadata server 1 .
  • the saved file management table 154 stores information for managing correspondences between the erased data and the saved file.
  • the saved file management table 154 includes one or more records, and each of the records includes the metadata ID 1541 , the saved path 1542 , the saved name space ID 1543 , and an address range 1544 .
  • Each record of the saved file management table 154 corresponds to information on the erased data generated in the processing of one access.
  • the address range 1544 is newly added.
  • the address range 1544 stores the address range of the erased data on the original file, the erased data was stored in the original file.
  • the metadata server 1 moves the erased data to the saved file and updates the saved file management table 154 .
  • the first record stores information on erased data in the file “/share1/b.doc”.
  • the metadata ID 1541 stores the identifier “110” of the metadata corresponding to the file “/share1/b.doc”.
  • the saved path 1542 stores the path name “/r/FS1/share1/b.doc” of the location of the saved file.
  • the saved name space ID 1543 stores the identifier “n3001” of the name space in which the saved file “/r/FS1/share1/b.doc” is stored.
  • the address range 1544 stores an address range [10,20) of the erased data in the original file “/share1/b.doc”.
  • FIG. 20 is an explanatory diagram illustrating an example of a configuration of the hidden file management table 415 according to the third embodiment of this invention.
  • the hidden file management table 415 in the third embodiment is stored in the memory 41 of the file server 4 .
  • the hidden file management table 415 stores information for managing correspondences between the erased data and the hidden file.
  • the hidden file management table 415 includes one or more records, and each of the records includes the path 4151 , the name space ID 4152 , the original metadata 4153 , the hidden file path 4154 , an address range 4155 , and an erasure type 4156 .
  • Each record of the hidden file management table 415 corresponds to information on the erased data generated in the processing of one access.
  • the address range 4155 and the erasure type 4156 are newly added.
  • the address range 4155 stores the address range of the erased data on the original file in which the erased data was stored.
  • the erasure type 4156 stores a reason why the erased data was generated.
  • the erasure type 4156 stores “removed”, which is information indicating that the file was removed. In a case where the erased data was generated due to the overwrite in a part of the file or the truncation of the file size, the erasure type 4156 stores “partially erased”, which is information indicating that a part of data of the file was erased.
  • the file server 4 reads the erased data from the original file to write the erased data in the hidden file, and updates the hidden file management table 415 .
  • FIG. 21 is a flowchart illustrating processing executed by the file sharing program 411 according to the third embodiment of this invention.
  • the third embodiment is different from the second embodiment in that not only when the removal of the file is requested but also when the erased data is generated due to the overwrite on the file or the truncation of the file size, the erased data is stored in the hidden file storage area 454 .
  • the file sharing program 411 receives an access request to a file from the business program 51 or another program via the network 7 (Step S 8701 ).
  • the file sharing program 411 determines whether or not the erased data is generated, in a case where processing corresponding to the received access request is executed (Step S 8702 ). In other words, it is determined whether or not the received access request requests the erasure of data from the file. For example, in a case where the received access request is a request for the removal of the file, the overwrite on the file, the truncation of the file size, or the like, it is determined that the erased data is generated, in a case where the processing corresponding to the received access request is executed.
  • Step S 8705 the file sharing program 411 proceeds to Step S 8705 .
  • the file sharing program 411 moves the erased data to the hidden file storage area 454 (Step S 8703 ).
  • the file sharing program 411 identifies the address range of the erased data, generates a hidden file for storing the erased data in the hidden file storage area 454 , and stores the erased data in the generated hidden file.
  • a path name of the hidden file is determined so as not to overlap with the other hidden files stored in the hidden file storage area 454 .
  • the file sharing program 411 updates the hidden file management table 415 based on information on the generated hidden file (Step S 8704 ).
  • the file sharing program 411 adds a new record to the hidden file management table 415 .
  • the file sharing program 411 stores the path name of the original file in the path 4151 of the added record, stores in the name space ID 4152 an identifier of a name space in which the original file is stored, and stores the metadata of the original file in the original metadata 4153 .
  • the file sharing program 411 stores the path name of the generated hidden file in the hidden file path 4154 , and stores the address range of the erased data in the address range 4155 . Further, the file sharing program 411 stores in the erasure type 4156 “removed” when the file is removed, and “partially erased” when the file is not removed.
  • the file sharing program 411 executes the processing corresponding to the received access request on the file (Step S 8705 ).
  • the file sharing program 411 determines whether or not the removal notification needs to be transmitted (Step S 8706 ). It should be noted that the removal notification also includes a notification that the access request that generates the erased data has been received.
  • the file sharing program 411 ends the processing (Step S 8708 ).
  • the file sharing program 411 notifies the metadata server 1 of the generation of the erased data (Step S 8707 ).
  • the notification includes information on all the records stored in the hidden file management table 415 , that is, information on all the hidden files. Thereafter, the file sharing program 411 ends the processing (Step S 8708 ).
  • Steps 8706 and S 8707 is executed in the course of the processing in response to the access request, but may be periodically executed as processing independent of the processing in response to the access request.
  • FIG. 22 is a flowchart illustrating processing executed by the file removal detection program 113 according to the third embodiment of this invention.
  • Step S 8800 the file removal detection program 113 detects the generation of the erased data in the file server 4 (Step S 8801 ).
  • the file removal detection program 113 may detect that the erased data has been generated in the file server 4 by receiving the removal notification that the erased data has been generated from the file server 4 . It should be noted that the removal notification includes the information stored in the hidden file management table 415 .
  • the file removal detection program 113 executes the processing for each piece of the erased data, that is, for each record of the hidden file management table 415 .
  • the file removal detection program 113 determines, based on the hidden file management table 415 included in the received removal notification, whether or not the erased data to be processed is generated due to the removal of the file (Step S 8802 ). In other words, it is determined whether the file that included the erased data to be processed is the removed file or the partially erased file.
  • the file removal detection program 113 determines that the erased data was generated due to the removal of the file.
  • the file removal detection program 113 determines that the erased data was generated due to the overwrite on the file or the truncation of the file size.
  • the file removal detection program 113 identifies a record of the metadata management table 153 corresponding to the file to be processed, and stores “removed” in the file status 1535 of the record (Step S 8803 ). Thereafter, the file removal detection program 113 proceeds to Step S 8804 .
  • the file removal detection program 113 adds a record corresponding to the file to be processed to the metadata management table 153 (Step S 8808 ).
  • the file removal detection program 113 stores an identifier that does not overlap with the other records in the metadata ID 1531 of the added record.
  • the file removal detection program 113 stores the path name and the metadata of the file to be processed in the path 1532 and the original metadata 1534 of the added record, respectively.
  • the file removal detection program 113 stores in the name space ID 1533 an identifier of a name space in which the file to be processed is stored.
  • the file removal detection program 113 stores “partially erased” in the file status 1535 .
  • the information to be stored in the added record may be obtained based on the information included in the removal notification received from the file server 4 .
  • the file removal detection program 113 updates the saved file management table 154 (Step S 8804 ). To be specific, the file removal detection program 113 adds a record corresponding to the hidden file in which the erased data to be processed is stored.
  • the added record stores in the metadata ID 1541 the same identifier as the metadata ID 1531 of the record identified in Step S 8804 or the metadata ID 1531 of the record added in Step S 8808 .
  • the saved path 1542 stores the path name of the hidden file
  • the saved name space ID 1543 stores an identifier of a name space in which the hidden file is stored
  • the address range 1544 stores the address range of the erased data stored in the hidden file. It should be noted that the information to be stored in the added record may be obtained based on the information included in the removal notification received from the file server 4 .
  • the file removal detection program 113 moves the hidden file to the saving storage apparatus 2 (Step S 8805 ). To be specific, the file removal detection program 113 copies the hidden file in the name space of the saving storage apparatus 2 to move the erased data to be processed to the saved file. At this time, the path name of the saved file is determined so as not to overlap with the other saved files stored in the saving storage apparatus 2 .
  • the file removal detection program 113 updates the saved file management table 154 (Step S 8806 ). To be specific, the file removal detection program 113 changes the saved path 1542 of the record added in Step S 8804 to the path name of the saved file.
  • the file removal detection program 113 instructs the file server 4 to remove the hidden file (Step S 8807 ). Thereafter, the file removal detection program 113 ends the processing (Step S 8809 ).
  • FIGS. 23 and 24 are explanatory diagrams each illustrating an example of the metadata management table 153 according to the third embodiment of this invention.
  • FIG. 25 is an explanatory diagram illustrating an example of the saved file management table 154 according to the third embodiment of this invention.
  • FIG. 23 represents the metadata management table 153 before the data is overwritten on the file “/share1/a.doc”.
  • information on the file “/share1/a.doc” is recorded. It can be seen from the information stored in the record that the file “/share1/a.doc” is stored in the file server 4 and a modified time thereof is “10:00”.
  • FIG. 24 represents the metadata management table 153 after the data is overwritten on the file “/share1/a.doc” and the metadata server 1 has moved the erased data to the saving storage apparatus 2 .
  • the second record having the metadata ID 1531 of “101” is added.
  • the record represents that the metadata server 1 manages the file “/share1/a.doc” at the modified time of “10:00” as the partially erased file. Therefore, the file status 1535 of the record stores “partially erased”.
  • the modified time is changed to “12:00” due to the overwrite of the data on the file “/share1/a.doc”.
  • FIG. 25 represents the saved file management table 154 after the data is overwritten on the file “/share1/a.doc” and the metadata server 1 has moved the erased data to the saving storage apparatus 2 .
  • the first record of the saved file management table 154 of FIG. 25 stores information on the erased data and the saved file of the partially erased file corresponding to the second record of the metadata management table 153 of FIG. 24 .
  • the metadata ID 1541 of the second record stores “100”. Therefore, it can be seen that the second record is a record relating to the erased data of the partially erased file corresponding to the second record of the metadata management table 153 of FIG. 24 .
  • the erased data is data that was stored in the range of addresses “0” to “29” of the original file.
  • FIG. 26 is a flowchart illustrating processing executed by the file read proxy program 115 according to the third embodiment of this invention.
  • the file read proxy program 115 receives a read request for the normal file, the removed file, or the partially erased file and responds to the requester with a content of the file.
  • the requested file is the removed file or the partially erased file
  • the requested file is temporarily restored to respond with the content of the restored file.
  • the file read proxy program 115 receives a file read request from the analysis program 61 or the like (Step S 8901 ).
  • the received file read request includes information for the requester program to specify the file. For example, information such as the path name, the name space name, the metadata, or another identifier (metadata ID or i-node number in the file system) of the file is included.
  • the file read proxy program 115 identifies a corresponding record of the metadata management table 153 based on the information included in the received file read request (Step 8902 ).
  • the file read proxy program 115 refers to the file status 1535 of the identified record to determine whether or not the file to be read is the normal file (Step S 8903 ).
  • the file status 1535 is “removed” or “partially erased”, it is determined that the file to be read is the removed file or the partially erased file. On the other hand, in a case where the file status 1535 is “present”, it is determined that the file to be read is the normal file.
  • the file read proxy program 115 executes restoration processing for restoring the file to be read (Step S 8904 ). As a result, the file is temporarily restored in the saving storage apparatus 2 . It should be noted that details of the restoration processing are described later with reference to FIG. 27 .
  • the file read proxy program 115 transmits the restored file to the requester, and ends the processing (Steps S 8905 and S 8907 ).
  • Step S 8906 the file read proxy program 115 identifies the location of the file to be read.
  • the location of the file is identified based on the identifier of the file server 4 , the identifier of the name space, the path name, and the like.
  • the file read proxy program 115 reads the file to be read from the file server 4 as the identified location to transmit the read file to the requester, and ends the processing (Steps S 8905 and S 8907 ).
  • FIG. 27 is a flowchart illustrating the details of the restoration processing according to the third embodiment of this invention.
  • the file read proxy program 115 extracts records relating to the file to be read from the metadata management table 153 (Step S 9001 ). In this example, records of the same file to be read that are newer in time series than the record identified in Step S 8903 are extracted.
  • the file read proxy program 115 extracts records each having the path 1532 and the name space ID 1533 that match those of the file to be read and having a modified time included in the original metadata 1534 that is later than the modified time of the file to be read, that is, having a newer modified time.
  • the file read proxy program 115 determines whether or not the file to be read is currently the removed file (Step S 9002 ). To be specific, of the extracted records, the file read proxy program 115 identifies a record for which a modified time stored in the original metadata 1534 is the latest, and determines whether or not the file status 1535 of the record is “removed”.
  • the file read proxy program 115 copies, based on the record of the removed file extracted in Step S 9001 , the removed file as a temporary file in a work area (Step S 9003 ).
  • the work area as used herein is one storage space of the saving storage apparatus 2 .
  • the file read proxy program 115 reads, based on the records extracted in Step S 9001 , the file to be read that is currently stored in the file server 4 , and copies the read file as a temporary file in the work area (Step S 9007 ).
  • the file read proxy program 115 selects, from among the extracted records, a record having the next newer modified time than the record identified in Step S 9003 as a record to be processed (Step S 9004 ).
  • the file read proxy program 115 overwrites the temporary file with removed data stored in the saved file (Step S 9005 ). To be specific, the following processing is executed.
  • the file read proxy program 115 identifies, based on the information in the record selected in Step S 9004 , a record of a corresponding saved file from the saved file management table 154 .
  • the file read proxy program 115 reads the saved file from the saving storage apparatus 2 based on the identified record to obtain the removed data.
  • the file read proxy program 115 refers to the address range 1544 of the identified record to overwrite the same address range of the temporary file with the read removed data. Moreover, the file read proxy program 115 changes a file size of the temporary file to the file size stored in the original metadata 1534 of the selected record of the metadata management table 153 .
  • the temporary file has the same content as the file at a time when the record selected in Step S 9004 is added to the metadata management table 153 .
  • the file read proxy program 115 determines whether or not the processing is complete for all the records extracted in Step 9001 (Step S 9006 ).
  • Step 9001 the file read proxy program 115 returns to Step S 9004 and executes similar processing (Steps S 9004 to S 9006 ).
  • Step S 9008 the file read proxy program 115 ends the processing (Step S 9008 ).
  • the metadata server 1 reads the file and transmits the read file to the analysis server 6 .
  • this invention is not limited thereto, and the analysis server 6 may obtain the file. In this case, the following processing is executed.
  • Step S 8905 the file read proxy program 115 generates the list 116 and transmits the generated list 116 to the analysis server 6 .
  • the method of generating the list 116 the same method as in the first embodiment is used.
  • the saved path 11681 of the record corresponding to the temporary file of the list 116 stores information on a location of the temporary file in the work area.
  • the analysis server 6 reads the files based on the received list 116 . It should be noted that this processing is the same as in the first embodiment, and hence a description thereof is omitted.
  • each piece of the erased data is stored in one saved file or hidden file, but this invention is not limited thereto.
  • the erased data may be stored collectively in several files, or stored in a database or block storage.
  • the fourth embodiment extends the first embodiment, and in a case where a file having the same content as that of the removed file is stored in the backup storage apparatus 3 , the saved file corresponding to the removed file is not generated. In this manner, the number of copied files having the same content may be reduced in the computer system 500 .
  • the components of the computer system 500 , and the components of the metadata server 1 and the file server 4 in the fourth embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. Moreover, the configuration of each table managed by the metadata server 1 and the file server 4 is also the same as that of the first embodiment, and hence a description thereof is omitted.
  • FIG. 28 is an explanatory diagram illustrating an example of a configuration of the storage management table 151 according to the fourth embodiment of this invention.
  • the storage ID 1511 , the storage name 1512 , the type 1513 , and the IP address 1514 are the same as those of the first embodiment, and hence descriptions thereof are omitted.
  • the fourth embodiment is different from the first embodiment in that the metadata server 1 also manages the backup storage apparatus 3 in addition to the file server 4 and the saving storage apparatus 2 .
  • the fourth record of the storage management table 151 illustrated in FIG. 28 stores information on a backup storage apparatus 3 . It should be noted that the type 1513 of the record corresponding to the backup storage apparatus 3 stores “backup”.
  • FIG. 29 is an explanatory diagram illustrating an example of a configuration of the name space management table 152 according to the fourth embodiment of this invention.
  • the name space ID 1521 , the name space name 1522 , the storage ID 1523 , the capacity 1524 , the protocol 1525 , the used volume 1526 , and the usage 1527 are the same as those of the first embodiment, and hence descriptions thereof are omitted.
  • the fifth record of the name space management table 152 stores information on a name space in the backup storage apparatus 3 . It should be noted that the usage 1527 of the record corresponding to the backup storage apparatus 3 stores “backup”.
  • FIG. 30 is an explanatory diagram illustrating an example of a configuration of the metadata management table 153 according to the fourth embodiment of this invention.
  • the metadata management table 153 is stored in the memory 11 of the metadata server 1 .
  • the metadata management table 153 in the fourth embodiment is different from the first embodiment in that a hash value 1536 is added.
  • the hash value 1536 stores a hash value representing the content of the file corresponding to the entry.
  • the hash value as used herein is a value obtained by applying a predefined hash function to the content of the file. For example, as the hash function, various known algorithms (for example, SHA256) may be used.
  • the fourth record of the metadata management table 153 stores information on a file “/BU/x.doc” stored in the backup storage apparatus 3 .
  • the file stored in the backup storage apparatus 3 is hereinafter referred to as a backup file.
  • the file status 1535 of an entry corresponding to the backup file stores “BU”, which represents that the file corresponding to the entry is the backup file.
  • BU the file status 1535 of an entry corresponding to the backup file
  • the hash value 1536 of the record it can be seen in the hash value 1536 of the record that a hash value calculated based on the file “/BU/x.doc” is “e001”. It is assumed here that the hash value is a value represented in hexadecimal notation.
  • the metadata management program 112 in this embodiment inquires of the backup program 31 of the backup storage apparatus 3 to obtain metadata of the backup file stored in the backup storage apparatus 3 . Moreover, the metadata management program 112 may read a database or the like holding a list of backup files managed by the backup program 31 .
  • the hash value of the backup file may be calculated by the metadata management program 112 , in a case where the metadata management program 112 reads the backup file from the backup storage apparatus 3 , or may be calculated by the backup program 31 and transmitted to the metadata management program 112 .
  • FIG. 31 is a flowchart illustrating processing executed by the file removal detection program 113 according to the fourth embodiment of this invention.
  • the file removal detection program 113 in the fourth embodiment determines whether or not there is a backup file having the same content as that of the file. In a case where there is a backup file having the same content, the file removal detection program 113 adds the backup file as the saved file corresponding to the file to be removed to the saved file management table 154 . Further, the file removal detection program 113 removes the file to be removed without generating the hidden file in the file server 4 .
  • Step S 9100 the file removal detection program 113 detects that a file is to be removed from the file server 4 (Step S 9101 ).
  • Step S 9101 is the same processing as Step S 8201 . It should be noted, however, that in the fourth embodiment, the removal notification transmitted from the file server 4 includes the hash value of the file to be removed.
  • the hash value of the file to be removed may be calculated by the file removal detection program 113 by applying the hash function to the file to be removed read from the file server 4 .
  • the file removal detection program 113 updates a record corresponding to the file to be removed of the metadata management table 153 (Step S 9102 ).
  • the processing of Step S 9202 is the same processing as Step S 8202 .
  • the file removal detection program 113 refers to the metadata management table 153 to search for a backup file having the same content as that of the file to be removed (Step S 9103 ). To be specific, the following processing is executed.
  • the file removal detection program 113 obtains the hash value 1536 of the file to be removed.
  • the file removal detection program 113 extracts an entry having “BU” stored in the file status 1535 , and compares a hash value 1536 of the extracted entry and the hash value 1536 of the file to be removed.
  • the entry matching the hash value 1536 of the file to be removed is the backup file having the same content as that of the file to be removed.
  • a method of determining the content of the file is not limited to the above-mentioned method.
  • a method of comparing the metadata of the files, a method of comparing file sizes, a method combining those methods, or the like may be used.
  • the file removal detection program 113 determines whether or not there is a backup file having the same content as that of the file to be removed (Step S 9104 ).
  • the file removal detection program 113 executes the file hiding processing on the file to be removed with respect to the file server 4 (Step S 9106 ).
  • the file removal detection program 113 instructs the file server 4 that has provided the notification of the removal of the file to execute the hiding processing of the file to be removed (Step S 9107 ), and ends the processing (Step S 9108 ).
  • Steps S 9106 and S 9107 is the same processing as Steps S 8203 and S 8204 , and hence a description thereof is omitted.
  • Step S 9104 In a case where it is determined in Step S 9104 that there is a backup file having the same content as that of the file to be removed, the file removal detection program 113 updates the saved file management table 154 and ends the processing (Steps S 9105 and S 9108 ).
  • the file removal detection program 113 adds the information on the backup file as information on the saved file corresponding to the file to be removed to the saved file management table 154 .
  • a value of the metadata ID 1531 of a record corresponding to the backup file is stored in the metadata ID 1541
  • the path name of the path 1532 of the record corresponding to the backup file is stored in the saved path 1542
  • an identifier of the name space ID 1533 of the record corresponding to the backup file is stored in the saved name space ID 1543 .
  • the files stored in the backup storage apparatus 3 are searched for the file having the same content as that of the file to be removed, but in addition thereto, all the storage apparatus managed by the metadata server 1 may be searched.
  • the file server 4 does not transmit the removal notification of the file to the metadata server 1 , in a case where removal of a file is requested from the business program 51 . Therefore, the metadata server 1 periodically determines whether or not a file has been removed from the file server 4 . For the determination, a snapshot function of the file server 4 is used.
  • the components of the computer system 500 , and the components of the metadata server 1 and the file server 4 in the fifth embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. It should be noted that the fifth embodiment is different in that the file server 4 has the snapshot function. Moreover, the configuration of each table managed by the metadata server 1 and the file server 4 is also the same as that of the first embodiment, and hence a description thereof is omitted.
  • FIGS. 32A and 32B are flowcharts illustrating processing executed by the metadata management program 112 according to the fifth embodiment of this invention.
  • the metadata management program 112 collects the metadata of the files stored in the file server 4 , and detects a file removed from the file server 4 and moves the file to the saving storage apparatus 2 .
  • Step S 9200 the metadata management program 112 instructs the file server 4 to generate a snapshot of the name space from which the metadata is to be collected (Step S 9201 ). In a case of receiving the instruction, the file server 4 generates the snapshot of the specified name space.
  • the metadata management program 112 selects one file to be processed from among files included in the generated snapshot (Step S 9202 ).
  • the processing of Step 9202 is different from the processing of Step S 8002 (see FIG. 9 ) in that a file included in the snapshot is selected.
  • the metadata management program 112 obtains metadata of the selected file from the file server 4 (Step S 9203 ).
  • the metadata management program 112 updates the metadata management table 153 based on the obtained metadata (Step S 9204 ).
  • the processing of Step S 9204 is the same processing as the processing of Step S 8004 (see FIG. 9 ).
  • the metadata management program 112 determines whether or not the processing is complete for all the files included in the snapshot (Step S 9205 ).
  • Step S 9202 the metadata management program 112 returns to Step S 9202 and executes similar processing (Steps S 9202 to S 9205 ).
  • the metadata management program 112 extracts, from among the records of the metadata management table 153 , records that have not been updated in the processing of Steps S 9201 to S 9205 (Step S 9206 ).
  • the metadata management program 112 selects one record to be processed from among the extracted records (Step S 9207 ).
  • the metadata management program 112 determines whether or not a file corresponding to the record to be processed is included in the snapshot (Step S 9208 ).
  • Step S 9212 the metadata management program 112 proceeds to Step S 9212 .
  • the metadata management program 112 updates the record to be processed (Step S 9209 ). To be specific, the metadata management program 112 stores “removed” in the file status 1535 of the record to be processed.
  • the file corresponding to the record to be processed is a file that has been removed before the snapshot is generated. Therefore, the file is managed as a removed file.
  • the metadata management program 112 obtains the file corresponding to the record to be processed from the snapshot of the previous generation of the snapshot generated in Step S 9201 (Step S 9210 ).
  • the snapshot of the previous generation is generated in this processing executed last time. It should be noted that the snapshot of the previous generation may be stored in the file server 4 or in the saving storage apparatus 2 .
  • the metadata management program 112 moves the file obtained from the snapshot of the previous generation as the saved file of the removed file corresponding to the record to be processed to the saving storage apparatus 2 (Step S 9211 ).
  • the metadata management program 112 updates the saved file management table 154 (Step S 9212 ).
  • the processing of Step S 9212 is the same processing as the processing of Step S 8208 (see FIG. 11C ).
  • the metadata management program 112 determines whether or not the processing is complete for all the records extracted in Step S 9206 (Step S 9213 ).
  • Step S 9206 the metadata management program 112 returns to Step S 9207 and executes similar processing (Steps S 9207 to S 9213 ).
  • the metadata management program 112 instructs the file server 4 to remove the snapshot of the previous generation, and ends the processing (Steps S 9214 and S 9215 ). In a case of receiving the instruction, the file server 4 removes the specified snapshot.
  • the file server 4 does not need to provide a notification of the removal of the file, and hence even a file server 4 not having the function of providing the notification of the removal of the file may move the removed file to the saving storage apparatus 2 .
  • the hidden file is removed under the instruction of the metadata server 1 . This is to prevent, even when a failure occurs in the file server 4 , the metadata server 1 , or the network 7 and the file save processing that is being executed is stopped, the hidden file from being removed by the file server 4 before completion of movement of the file to the saving storage apparatus 2 by the metadata server 1 .
  • the file server 4 detects the failure and delays the notification of the file removal until the communication with the metadata server 1 is resumed.
  • the file server 4 may continue the operation by switching to the notification method of the file removal in the second embodiment.

Abstract

A computer system, comprising: a file server; a metadata server; and a business server, the metadata server being coupled to a storage apparatus for providing a save area for storing at least one file that is removed from the file server, the metadata server storing a metadata repository for managing metadata of a file and the files stored in the save area, the metadata server being configured to: store a file as a saved file in the save area, in a case of detecting that the file stored in the file server is to be removed; and store information indicating a location of the file in the file server and information indicating the location of the saved file in the save area in association with each other in the metadata repository.

Description

BACKGROUND OF THE INVENTION
This invention relates to a file management method for use in a computer system including a storage apparatus, a metadata server for managing metadata of files stored in the storage apparatus, a business server for executing predetermined business processing, and an analysis server for executing analytical processing on data used by the business server.
In a computer system in which a plurality of computers and a plurality of file servers corresponding to storage apparatus are coupled via a network, business programs operating on the computers execute business logic. The business programs include, for example, programs that autonomously operate, such as a document management system, and interactive programs such as a word processing program used by a user.
Business data required by the business program to execute the logic may be stored in the file server to flexibly perform a configuration change of a system and management of a storage capacity.
Moreover, it is a common practice that an analysis program operating on a computer different from the business program executes the analytical processing such as statistical processing on the business data stored in the file server to obtain information useful for business management.
The business program may remove a file stored in the file server in the course of the logic. On the other hand, it is preferred that the analysis program obtain and analyze all files in the computer system tracing back in time, including the file removed from the file server, in order to obtain more useful information.
As a method for allowing the removed file to be read later, there is known a method using a backup system. The backup system periodically reads data stored in the file server and copies the data in another storage apparatus for backup. However, the backup system holds the same data in the file server and the storage apparatus for backup, and hence a use efficiency of storage spaces is low.
Moreover, as another method, there is known a method using a snapshot function of the file server. The snapshot function is used so that a plurality of states of the file server at a time point in the past may be held while suppressing an amount of consumption of the storage spaces. However, there is a limit in the number of snapshots that can be created, and hence, for example, the method is not suited for an application where a file that was present at a time point tracing back in time 5 years or more is to be obtained.
Moreover, as a method of moving a file to another storage apparatus, there is known an archive system. The archive system is a system for moving a file that satisfies a predetermined condition (for example, file that has not been modified for a certain period of time) to another storage. However, the archive system deals only with files that are present in the file system, and cannot specify “removed files” as a condition, for example.
Moreover, in Japanese Patent Application Laid-open No. 2008-17049, there is disclosed a technology in which a file removed by a user's operation is not actually removed but is saved in another storage space so that the file can be restored later.
SUMMARY OF THE INVENTION
However, in the technology disclosed in Japanese Patent Application Laid-open No. 2008-17049, when the removed file is restored once, the file is not managed by the system anymore. Therefore, the object of providing to the analysis program all files in the computer system tracing back in time, including the removed file, cannot be achieved.
This invention realizes a computer system allowing all files under management of a business program, including a removed file that was present in the past, to be referenced from an analysis program without creating an extra copy.
The present invention can be appreciated by the description which follows in conjunction with the following figures, wherein: a computer system comprises: a file server for managing a plurality of files; a metadata server for managing a plurality of piece of metadata of the plurality of files; and a business server for using the plurality of files to execute predetermined business processing. The file server, the metadata server, and the business server is coupled to each other via a network. The file server includes a first processor, a first memory coupled to the first processor, a first network interface coupled to the first processor, and a first storage medium coupled to the first processor, for storing the plurality of files. The metadata server includes a second processor, a second memory coupled to the second processor, a second network interface coupled to the second processor, and a second storage medium coupled to the second processor. The business server includes a third processor, a third memory coupled to the third processor, and a third network interface coupled to the third processor. The metadata server is coupled to a storage apparatus including a controller and a plurality of storage media, for providing a save area for storing at least one file that is removed from the file server. The second storage medium stores a metadata repository for managing at least one of the plurality of piece of metadata of the plurality of files and at least one location of one of the plurality of files stored in the save area. The metadata server is configured to: store the one of the plurality of files as a saved file in the save area, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server; and store information indicating a location of the one of the plurality of files in the file server and information indicating the location of the saved file in the save area in association with each other in the metadata repository.
According to this invention, the metadata server may manage the file removed from the file server without creating the extra copy.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram outlining processing according to this invention,
FIG. 2 is a block diagram illustrating a configuration of a computer system according to a first embodiment of this invention,
FIG. 3 is a block diagram illustrating a configuration of a metadata server according to the first embodiment of this invention,
FIG. 4 is an explanatory diagram illustrating an example of a configuration of a storage management table according to the first embodiment of this invention,
FIG. 5 is an explanatory diagram illustrating an example of a configuration of a name space management table according to the first embodiment of this invention,
FIG. 6 is an explanatory diagram illustrating an example of a configuration of a metadata management table according to the first embodiment of this invention,
FIG. 7 is an explanatory diagram illustrating an example of a configuration of a saved file management table according to the first embodiment of this invention,
FIG. 8 is a block diagram illustrating a configuration of a file server according to the first embodiment of this invention,
FIG. 9 is a flowchart illustrating processing executed by a metadata management program according to the first embodiment of this invention,
FIG. 10 is a flowchart illustrating processing executed by a file sharing program according to the first embodiment of this invention,
FIGS. 11A, 11B, and 11C are flowcharts illustrating processing executed by a file removal detection program according to the first embodiment of this invention,
FIG. 12 is an explanatory diagram illustrating the metadata management table after a file is moved according to the first embodiment of this invention,
FIG. 13 is an explanatory diagram illustrating the saved file management table after the file is moved according to the first embodiment of this invention,
FIG. 14 is a flowchart illustrating processing executed by a inquiry processing program according to the first embodiment of this invention,
FIGS. 15A and 15B are explanatory diagrams illustrating an example of a configuration of the list according to the first embodiment of this invention,
FIG. 16 is a flowchart illustrating the analytical processing on files executed by an analysis program according to the first embodiment of this invention,
FIG. 17 is an explanatory diagram illustrating an example of a configuration of a hidden file management table according to a second embodiment of this invention,
FIG. 18 is a flowchart illustrating processing executed by the file sharing program according to the second embodiment of this invention,
FIG. 19 is an explanatory diagram illustrating an example of a configuration of the saved file management table according to a third embodiment of this invention,
FIG. 20 is an explanatory diagram illustrating an example of a configuration of the hidden file management table according to the third embodiment of this invention,
FIG. 21 is a flowchart illustrating processing executed by the file sharing program according to the third embodiment of this invention,
FIG. 22 is a flowchart illustrating processing executed by the file removal detection program according to the third embodiment of this invention,
FIGS. 23 and 24 are explanatory diagrams each illustrating an example of the metadata management table according to the third embodiment of this invention,
FIG. 25 is an explanatory diagram illustrating an example of the saved file management table according to the third embodiment of this invention,
FIG. 26 is a flowchart illustrating processing executed by a file read proxy program according to the third embodiment of this invention,
FIG. 27 is a flowchart illustrating the details of a restoration processing according to the third embodiment of this invention,
FIG. 28 is an explanatory diagram illustrating an example of a configuration of the storage management table according to a fourth embodiment of this invention,
FIG. 29 is an explanatory diagram illustrating an example of a configuration of the name space management table according to the fourth embodiment of this invention,
FIG. 30 is an explanatory diagram illustrating an example of a configuration of the metadata management table according to the fourth embodiment of this invention,
FIG. 31 is a flowchart illustrating processing executed by the file removal detection program according to the fourth embodiment of this invention,
FIGS. 32A and 32B are flowcharts illustrating processing executed by the metadata management program according to a fifth embodiment of this invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
First, this invention is outlined.
FIG. 1 is a block diagram outlining processing according to this invention.
A computer system 500 according to this invention includes a metadata server 1, a saving storage apparatus 2, a plurality of file servers 4, a plurality of business servers 5, and a plurality of analysis servers 6.
The business server 5 is a computer for executing a predetermined business task, and a business program 51 operates thereon. The business program 51 executes the predetermined business task using files stored in the file servers 4.
In an example illustrated in FIG. 1, the business program 51 executes the predetermined business task using a file 1000-1 having a path name of “/A/a.doc” and a file 1000-2 having a path name of “/A/c.doc”. When not distinguished, the files are hereinafter referred to as files 1000.
The analysis server 6 is a computer for analyzing the files 1000, and an analysis program 61 operates thereon. The analysis program 61 reads the files 1000-1 and 1000-2 used by the business program 51 and executes analytical processing such as statistical processing.
The metadata server 1 is a computer for managing a plurality of piece of metadata of the files stored in the plurality of file servers 4. The metadata server 1 according to this embodiment has a feature in that metadata on a file that has been removed from the file servers 4 is also managed.
The metadata as used herein refers to a set of attribute values set to a file. For example, the metadata includes an owner of the file, an owner group of the file, access control information, a creation date of the file, a modified date of the file, a metadata modification date of the file, a size of the file, and other user-defined attribute values.
The metadata server 1 manages a metadata repository in which the plurality of piece of metadata of the files is stored. The metadata repository includes a field for identifying a file stored in the file server 4, a field for identifying a file stored in the saving storage apparatus 2, and a field indicating a status of the file.
The field for identifying the file stored in the file server 4 includes a path name and a storage name. The field for identifying the file stored in the saving storage apparatus 2 includes a path name and a storage name. Moreover, the field indicating the status of the file stores information indicating whether or not the file is present in the file server 4.
Next, processing executed in a case where the business program 51 removes the file 1000-1 is outlined.
The business program 51 transmits to the file server 4 having an identification name of “FS1” a request to remove the file 1000-1 (Step S1001).
In a case of detecting the request to remove the file, the file server 4 suspends the removal of the file 1000-1 and notifies the metadata server 1 that the request to remove the file 1000-1 has been received (Step S1002).
In a case of receiving the notification from the file server 4 (Step S1003), the metadata server 1 updates a record corresponding to the file 1000-1 stored in a metadata repository 150 (Step S1004). To be specific, in the field indicating the status of the file, “removed” is stored to indicate that the file 1000-1 is to be removed.
Next, the metadata server 1 moves the file 1000-1 to the saving storage apparatus 2 (Step S1005). To be specific, the metadata server 1 obtains the file 1000-1 from the file server 4 and stores the file 1000-1 as a file 1008 in a file system 22 of the saving storage apparatus 2.
In the example illustrated in FIG. 1, the file 1008 is stored under a path name of “r/FS1/A/a.doc”. It should be noted that path names in the saving storage apparatus 2 are set so as not to overlap.
Next, the metadata server 1 instructs the file server 4 to remove the file 1000-1 (Step S1006). In a case of receiving the instruction, the file server 4 removes the file 1000-1 and responds to the business program 51 with a completion of the removal of the file 1000-1.
Finally, the metadata server 1 updates the record corresponding to the metadata of the file 1000-1 in the metadata repository 150 (Step S1007). To be specific, in the field for identifying the file stored in the saving storage apparatus 2, the path name “r/FS1/A/a.doc” of the file 1008 and an identification name “S1” of the saving storage apparatus 2, in which the file 1008 is stored, are stored.
FIG. 1 illustrates a change in the metadata repository 150 before and after the removal of the file 1000-1.
Next, analytical processing in which the analysis program 61 analyzes files at present and in the past is outlined. A description is given here of the analytical processing after the file 1000-1 is removed from the file server 4 by the business program 51 and the file 1000-1 is moved to the saving storage apparatus 2.
The analysis program 61 inquires of the metadata server 1 about all files including the files that are currently stored and the files that were present in the past (Step S1011). To be specific, the analysis program 61 requests a list of all the files from the metadata server 1.
The metadata server 1 generates the list based on the metadata repository 150 and responds to the analysis program 61 with the generated list (Step S1012).
It should be noted that the list includes a plurality of entries including information for identifying the files. The entry includes fields indicating the path name of the file, an identification name of a stored storage apparatus, the metadata of the file in the file server 4, and a status of the file.
The entry of the file 1000-1 removed from the file server 4 further includes the saved path name of the file and the identification name of the saving storage apparatus 2. Moreover, the field indicating the status of the file of the entry stores information indicating that the file has been removed.
The analysis program 61 identifies locations of the files based on the list obtained from the metadata server 1.
In the example illustrated in FIG. 1, the analysis program 61 finds that two files having the path names of “/A/a.doc” and “/A/c.doc” have been present in the file server 4. Further, the analysis program 61 finds that, of the above-mentioned files, the file having the path name of “/A/a.doc” has been removed from the file server 4 and stored as the file 1008 having the path name of “r/FS1/A/a.doc” in the saving storage apparatus 2 having the identification name of “S1”.
The analysis program 61 refers to the list to obtain all the files required for the analytical processing (Steps S1013 and S1014). In other words, the analysis program 61 obtains from the file server 4 the file 1000-2 stored in the file server 4 and obtains from the saving storage apparatus 2 the file 1008 corresponding to the file 1000-1 that has been removed from the file server 4.
As described above, the metadata server 1 may manage files that have been removed by the business program 51 during the execution of the business task so as to be analyzable by the analysis program 61.
In this manner, according to this invention, in a case where a file is to be removed from the file server 4, the file is moved to the saving storage apparatus 2 before being removed from the file server 4, and hence an unnecessary copy of the file is not created.
A file that is removed from the file server 4 and may be inquired of the metadata server 1 to obtain its content as with the file 1000-1 is hereinafter referred to as a removed file. Moreover, a copy of the removed file stored in the saving storage apparatus is referred to as a saved file. Moreover, the file that is to be removed and has been stored in the file server 4 before becoming the removed file is referred to as an original file. Moreover, a file that is stored in the file server 4 and has not been removed is referred to as a normal file.
First Embodiment
FIG. 2 is a block diagram illustrating a configuration of the computer system 500 according to a first embodiment of this invention.
The computer system 500 includes the metadata server 1, the saving storage apparatus 2, a backup storage apparatus 3, the plurality of file servers 4, the plurality of business servers 5, the plurality of analysis servers 6, and a network 7.
The metadata server 1, the saving storage apparatus 2, the backup storage apparatus 3, the file servers 4, the business servers 5, and the analysis servers 6 may communicate with each other via the network 7. It should be noted that the network 7 may be constituted by using a local area network (LAN), a wide area network (WAN), the Internet, or the like. This invention is not limited to a coupling system of the network 7.
The metadata server 1 is a computer for managing the metadata. It should be noted that the metadata server 1 may be a virtual machine generated by using a virtualization technology.
The metadata server 1 includes a metadata server program 110 and the metadata repository 150. The other components are described later.
The saving storage apparatus 2 is a storage apparatus for storing various files.
The storage apparatus as used herein refers to an apparatus that includes a controller (not shown), a network interface (not shown), and one or more storage media (not shown) and is capable of providing storage spaces of the storage media to a computer. The storage apparatus may use a plurality of storage media to constitute a redundant array of inexpensive disks (RAID), and further may use a physical storage space to generate a plurality of logical storage spaces. Moreover, the storage apparatus may construct a different file system for each of the logical storage spaces.
The saving storage apparatus 2 includes a file sharing program 21 and the file system 22. The file sharing program 21 stores a file in the file system 22 and reads the file from the file system 22 in accordance with a file access request received from the metadata server 1 via the network 7. The other components are described later.
The backup storage apparatus 3 is a storage apparatus for storing various files. It should be noted, however, that the backup storage apparatus 3 is used especially for the purpose of backing up the files. The backup storage apparatus 3 includes a backup program 31 and a file system 32. The other components are described later.
The file server 4 is a computer for storing various files and managing the files. In particular, the file server 4 stores files required by the business program 51 to execute business processing. The file server 4 includes a file sharing program 411 and a file system 452. The other components are described later.
It should be noted that on the computer, the file server 4 is also recognized as a type of storage apparatus.
The business server 5 is a computer for executing a program required to realize the business processing. It should be noted that the business server 5 may be a virtual machine generated by using the virtualization technology.
The business server 5 includes the business program 51. The business program 51 is a program for performing specified business processing, and obtains data required for the business processing from the file server 4 to execute the predetermined business processing. The other components are described later.
The analysis server 6 is a computer for executing a program required to realize the analytical processing. It should be noted that the analysis server 6 may be a virtual machine generated by using the virtualization technology.
The analysis server 6 includes the analysis program 61. The analysis program 61 reads a file stored in the file server 4 and used by the business program 51 for the business processing, and uses the read file to execute the analytical processing.
FIG. 3 is a block diagram illustrating a configuration of the metadata server 1 according to the first embodiment of this invention.
The metadata server 1 includes a memory 11, a processor 12, a network interface 13, and a local storage 15, and the components are connected to each other via an internal bus 16.
The processor 12 executes programs stored in the memory 11. The processor 12 executes the programs so that functions of the metadata server 1 may be realized.
The memory 11 stores the metadata server program 110. The metadata server program 110 is a program for realizing the functions of the metadata server 1, and includes a plurality of subprograms.
To be specific, the metadata server program 110 includes an inquiry processing program 111, a metadata management program 112, a file removal detection program 113, a file save program 114, and a file read proxy program 115.
The inquiry processing program 111 is a program for executing processing on inquiries from the file server 4 and the analysis server 6. The metadata management program 112 is a program for managing the metadata.
The file removal detection program 113 is a program for detecting that a file is to be removed from the file server 4. The file save program 114 is a program for copying the file to the saving storage apparatus 2. The file read proxy program 115 is a program for reading the file from the saving storage apparatus 2.
Each of the above-mentioned subprograms may be executed as an independent process or as a partial program such as a library constituting the metadata server program 110. It should be noted that details of the processing executed by the subprograms are described later with reference to the figures.
Moreover, the memory 11 also stores a list 116 generated when an inquiry from the analysis server 6 is received. The list 116 stores information required to obtain files from the file server 4 or the saving storage apparatus 2.
The local storage 15 is a storage medium of the metadata server 1, and may include a hard disk drive (HDD), a solid state drive (SSD), and a non-volatile memory (NVRAM).
The local storage 15 stores the metadata repository 150. It should be noted that the metadata repository 150 may be stored in the memory 11 or in a storage apparatus coupled to the metadata server 1.
The metadata repository 150 includes a storage management table 151, a name space management table 152, a metadata management table 153, and a saved file management table 154. In the following, configurations of the tables are described.
FIG. 4 is an explanatory diagram illustrating an example of a configuration of the storage management table 151 according to the first embodiment of this invention.
The storage management table 151 stores information on storage apparatus managed by the metadata server 1. To be specific, the storage management table 151 includes one or more records, and each of the records includes a storage ID 1511, a storage name 1512, a type 1513, and an IP address 1514.
Each record of the storage management table 151 corresponds to one storage apparatus managed by the metadata server 1.
The storage ID 1511 stores an identifier used by the metadata server 1 to uniquely identify the storage apparatus. The storage name 1512 stores an identification name set to the storage apparatus in the computer system 500.
The type 1513 stores a type of usage of the storage apparatus. For example, “file server” is stored in a case where the storage apparatus is the file server 4, and “archive storage” is stored in a case of a storage apparatus for storing archive files.
The IP address 1514 stores an IP address assigned to the storage apparatus.
In the example illustrated in FIG. 4, the first record stores information on a file server 4 having the storage ID 1511 of “s1000”, the storage name 1512 of “FS1”, the type 1513 of “file server”, and the IP address 1514 of “192.168.10.100”.
Similarly, the second record stores information on a file server 4, and the third record stores information on a saving storage apparatus 2.
FIG. 5 is an explanatory diagram illustrating an example of a configuration of the name space management table 152 according to the first embodiment of this invention.
The name space management table 152 stores information on name spaces in the storage apparatus managed by the metadata server 1. The name space as used herein is a logical unit for identifying a storage space in which the file is stored. In the case of the file server 4, a name such as a share name or a public name is known to correspond to the name space. Moreover, a similar concept is also known for the case of the saving storage apparatus 2.
The name space management table 152 includes one or more records, and each of the records includes a name space ID 1521, a name space name 1522, a storage ID 1523, a capacity 1524, a protocol 1525, a used volume 1526, and a usage 1527.
Each record of the name space management table 152 corresponds to a name space in the file server 4 or the saving storage apparatus 2.
The name space ID 1521 stores an identifier used by the metadata server 1 to uniquely identify the name space. The name space name 1522 stores a name used by the storage apparatus to uniquely identify the name space.
The storage ID 1523 stores an identifier of a storage apparatus providing a logical storage space corresponding to the name space. It should be noted that the storage ID 1523 is the same as the storage ID 1511.
The capacity 1524 stores a capacity of the logical storage space corresponding to the name space. The protocol 1525 stores a protocol used to access the logical storage space corresponding to the name space. The used volume 1526 stores a used volume of the logical storage space corresponding to the name space.
The usage 1527 stores a usage of the logical storage space corresponding to the name space. For example, “primary” is stored in a case of a logical storage space used by the business program 51. Moreover, “saved” is stored in a case of a logical storage space storing saved files.
In the example illustrated in FIG. 5, the first and second records store information on name spaces on the file server 4 having the storage ID 1523 of “s1000”.
The first record stores “n1001” in the name space ID 1521, “share1” in the name space name 1522, “s1000” in the storage ID 1523, “20 TB” in the capacity 1524, “nfs” in the protocol 1525, “5 TB” in the used volume 1526, and “primary” in the usage 1527.
Similarly, the second record stores information on a name space having the name space name 1522 or a share name of “share2”. Moreover, the third record stores information on a name space of another file server 4 having the name space name 1522 or a share name of “share3”. Moreover, the fourth record stores information on a name space of a saving storage apparatus 2 having the name space name 1522 of “r”.
FIG. 6 is an explanatory diagram illustrating an example of a configuration of the metadata management table 153 according to the first embodiment of this invention.
The metadata management table 153 stores information indicating locations of files and metadata. To be specific, the metadata management table 153 includes one or more records, and each of the records includes a metadata ID 1531, a path 1532, a name space ID 1533, original metadata 1534, and a file status 1535.
Each record of the metadata management table 153 corresponds to a file stored in the file server 4 or a removed file.
The metadata ID 1531 stores an identifier for identifying the metadata. The path 1532 stores a path name indicating a location at which the file is stored.
The name space ID 1533 stores an identifier for identifying a name space of a logical storage space in which the file is stored. The name space ID 1533 is the same as the name space ID 1521.
The original metadata 1534 stores metadata (not shown) in the file server 4.
The file status 1535 stores information indicating whether or not the file is present in the file server 4. To be specific, “present” is stored in a case where the file is present in the file server 4, and “removed” is stored in a case where the file is not present in the file server 4.
A record having “present” stored in the file status 1535 indicates that a file corresponding to the record is stored at the location indicated by the path 1532 and the name space ID 1533.
On the other hand, a record having “removed” stored in the file status 1535 indicates that a file corresponding to the record is not currently stored at the location indicated by the path 1532 and the name space ID 1533, and is currently a removed file.
The metadata of the file is managed by the file server 4 for each of the files, and the metadata server 1 may obtain the metadata from the file server 4 through an application programming interface (API) provided for each type of name space.
In the example illustrated in FIG. 6, the metadata management table 153 stores three records. It should be noted that the number of records is merely an example and is not intended to limit this invention. In other words, the metadata management table 153 stores records corresponding to the metadata of all the files managed by the metadata server 1.
The first record represents metadata corresponding to the file “/share1/a.doc” stored in the name space “share1” of the file server 4, and stores “100” in the metadata ID 1531.
The first record stores in the path 1532 “/share1/a.doc”, which is a path name of the corresponding file, and stores in the name space ID 1533 “n1001”, which is an identifier of the name space “share1”. Moreover, the first record stores in the original metadata 1534 the metadata of the corresponding file in the file server 4, which is not shown here. Further, the first record stores “present” in the file status 1535.
The second record represents metadata corresponding to the file “/share1/b.doc” stored in the name space “share1” of the file server 4, and stores “110” in the metadata ID 1531. Moreover, the second record stores “removed” in the file status 1535. Therefore, the second record represents that the file “/share1/b.doc” is not currently stored at the location indicated by the path 1532 and the name space ID 1533, and is a removed file.
The third record represents metadata corresponding to the file “/share1/c.doc” stored in the name space “share1” of the file server 4, and stores “120” in the metadata ID 1531.
FIG. 7 is an explanatory diagram illustrating an example of a configuration of the saved file management table 154 according to the first embodiment of this invention.
The saved file management table 154 stores information on locations (save destinations) of saved files. To be specific, the saved file management table 154 includes one or more records, and each of the records includes a metadata ID 1541, a saved path 1542, and a saved name space ID 1543.
Each record of the saved file management table 154 corresponds to a saved file stored in the saving storage apparatus 2.
It should be noted that the metadata server 1 updates the saved file management table 154, in a case of detecting a file is to be removed from the file server 4, and being moved the file to the saving storage apparatus 2.
The metadata ID 1541 stores an identifier for identifying the metadata. The metadata ID 1541 is the same as the metadata ID 1531.
The saved path 1542 stores the path name indicating the location at which the saved file is stored. The saved name space ID 1543 stores an identifier for identifying a name space in which the saved file is stored.
In the example illustrated in FIG. 7, the first record stores information on a saved file corresponding to the file “/share1/b.doc” in FIG. 6.
The metadata ID 1541 stores the identifier “110” of the metadata corresponding to the file “/share1/b.doc”. Moreover, the saved path 1542 stores a path name “/r/FS1/share1/b.doc” of a location of the saved file corresponding to the file “/share1/b.doc”. Further, the saved name space ID 1543 stores an identifier “n3001” of a name space in which the saved file “/r/FS1/share1/b.doc” is stored.
Next, a configuration of the file server 4 is described.
FIG. 8 is a block diagram illustrating the configuration of the file server 4 according to the first embodiment of this invention.
The file server 4 includes a memory 41, a processor 42, a network interface 43, and a storage interface 44, and is coupled to a storage apparatus 45.
The processor 42 executes programs stored in the memory 41. The processor 42 executes the programs so that functions of the file server 4 may be realized.
The memory 41 stores the file sharing program 411, a file system program 412, and a storage input/output program 413.
The file sharing program 411 is a program for providing a function for the business program 51, the analysis program 61, and the metadata server program 110 to access a file stored in the storage apparatus 45 via the network 7.
The file system program 412 is a program for configuring the file system for storing the file in the storage apparatus 45 and managing input/output of the file.
The storage input/output program 413 is a program for managing read processing and write processing of data with respect to the storage apparatus 45.
The processor 42 executes the above-mentioned programs so that the file server 4 realizes a file sharing function via the network 7.
The storage apparatus 45 generates a storage volume 451 therein. The storage volume 451 is constituted of a storage space of a storage medium such as a hard disk drive, a solid state drive, or a non-volatile memory of the storage apparatus 45.
The storage volume 451 includes two name spaces 452-1 and 452-2. “share1” is set as an identification name to the name space 452-1, and “share1” is set as an identification name to the name space 452-2.
The name spaces 452-1 and 452-2 include data areas 453-1 and 453-2 and hidden file storage areas 454-1 and 454-2, respectively.
The data areas 453-1 and 453-2 are areas for storing files that can be referenced by the business program 51. The hidden file storage areas 454-1 and 454-2 are areas for temporarily storing files removed by the business program 51.
The files stored in the hidden file storage areas 454-1 and 454-2 are treated as files that are not present by the business program 51. In other words, the business program 51 cannot recognize the files stored in the hidden file storage areas 454-1 and 454-2.
The data areas 453-1 and 453-2 and the hidden file storage areas 454-1 and 454-2 may be included in different storage volumes 451, or may each be one directory in a single file system tree. Moreover, the name spaces 452-1 and 452-2 may be included in different storage volumes 451, or may each be one directory in a single file system tree.
In this embodiment, the two name spaces are defined in the storage volume 451. However, this invention is not limited thereto, and two or more name spaces may be defined.
When not distinguished, the data areas 453-1 and 453-2 are hereinafter represented as data areas 453. Moreover, when not distinguished, the hidden file storage areas 454-1 and 454-2 are represented as hidden file storage areas 454.
FIG. 9 is a flowchart illustrating processing executed by the metadata management program 112 according to the first embodiment of this invention.
The metadata management program 112 executes this processing periodically or in accordance with a user's request in order to update the metadata repository 150.
In a case where the processing is started (Step S8000), the metadata management program 112 refers to the name space management table 152 to select one name space to be processed (Step S8001).
Next, the metadata management program 112 selects one file to be processed from among files stored in the selected name space (Step S8002).
It should be noted that as a method of selecting the file, a method of following a file system tree in the name space in order from the upper directory may be contemplated.
The metadata management program 112 obtains metadata of the file to be processed from the file server 4 (Step S8003).
The metadata management program 112 updates the metadata management table 153 based on the obtained metadata (Step S8004). To be specific, the following processing is executed.
The metadata management program 112 determines whether or not a record corresponding to the selected file is registered. To be specific, the metadata management program 112 determines whether or not there is a record having the path 1532 and the name space ID 1533 that match the identifier of the name space to be processed and the path name of the file to be processed.
It should be noted that a method of determining whether or not the obtained metadata and the original metadata match may be employed. For example, an i-node number, which is identification information of the file in the file server 4, may be used.
In a case where it is determined that the record corresponding to the selected file is not registered, the metadata management program 112 registers a new record with the metadata management table 153. At this time, the metadata management program 112 generates an identifier for uniquely identifying the metadata and stores the generated identifier in the metadata ID 1531.
Further, the metadata management program 112 stores in the path 1532 the path name of the file to be processed in the selected name space, and stores the identifier of the selected name space in the name space ID 1533. The metadata management program 112 also stores the obtained metadata in the original metadata 1534, and stores “present” in the file status 1535.
On the other hand, in a case where the record corresponding to the selected file is registered, the metadata management program 112 stores the obtained metadata in the original metadata 1534 of the existing record.
The metadata management program 112 determines whether or not the processing is complete for all the files stored in the name space to be processed (Step S8005).
In a case where it is determined that the processing is not complete for all the files stored in the name space to be processed, the metadata management program 112 returns to Step S8002 and executes similar processing (Steps S8002 to S8005).
In a case where it is determined that the processing is complete for all the files stored in the name space to be processed, the metadata management program 112 determines whether or not the processing is complete for all the name spaces under its management (Step S8006).
In a case where it is determined that the processing is not complete for all the name spaces under its management, the metadata management program 112 returns to Step S8001 and executes similar processing (Steps S8001 to S8006).
In a case where it is determined that the processing is complete for all the name spaces under its management, the metadata management program 112 ends the processing (Step S8007).
FIG. 10 is a flowchart illustrating processing executed by the file sharing program 411 according to the first embodiment of this invention.
The file server 4 executes the following processing, in a case where an access request to a file is received from the business program 51 or another program.
In a case where the processing is started (Step S8100), the file sharing program 411 receives an access request to a predetermined file from the business program 51 or another program via the network 7 (Step S8101).
The file sharing program 411 determines whether or not the received access request is a request to remove the file (Step S8102).
In a case where it is determined that the received access request is not the request to remove the file, the file sharing program 411 instructs the file system program 412 to execute processing in accordance with the received access request (Step S8105). Thereafter, the file sharing program 411 transmits a response to the program that has transmitted the access request, and ends the processing (Step S8106).
In a case where it is determined that the received access request is the request to remove the file, the file sharing program 411 notifies the file removal detection program 113 of the metadata server 1 that the access request including the request to remove the file has been received (Step S8103).
The notification that the access request that requests the removal of the file has been received is hereinafter represented as a removal notification. Moreover, the file requested for removal by the business program 51 or another program is referred to as a file to be removed. The file to be removed is moved to the saving storage apparatus 2 by the metadata server 1 in the end. In a case where the file to be removed is moved to the saving storage apparatus 2 and “removed” is stored in the file status 1535 of the metadata management table 153, the file becomes a removed file.
It should be noted that the removal notification includes information such as the path name of the file to be removed, a name space in which the file to be removed is stored, the identification name of the file server, and metadata of the file to be removed.
In a case of receiving a response to the removal notification from the file removal detection program 113, the file sharing program 411 executes processing on the file to be removed in accordance with the response (Step S8104). It should be noted that the response transmitted from the file removal detection program 113 includes an instruction from the file save program 114. To be specific, the following processing is executed.
In a case where the received response includes an instruction to hide the file to be removed, the file sharing program 411 moves the file to be removed to the hidden file storage area 454. This disables the business program 51 from accessing the file to be removed. In other words, the file is recognized by the business program 51 as having been removed.
Moreover, in a case where the received response includes an instruction to remove the file to be removed, the file sharing program 411 removes the file to be removed.
It should be noted that the file sharing program 411 outputs the instructions to the file system program 412 to realize the moving processing and the removal processing of the file to be removed.
Hereinafter, the file to be removed stored in the hidden file storage area 454 is referred to as a hidden file.
In a case where the processing on the file to be removed is finished, the file sharing program 411 ends the processing (Step S8106).
In this embodiment, the file sharing program 411 executes the processing, but the processing may be executed by another program such as the file system program 412.
FIGS. 11A, 11B, and 11C are flowcharts illustrating processing executed by the file removal detection program 113 according to the first embodiment of this invention.
In a case where the processing is started (Step S8200), the file removal detection program 113 detects that a file is to be removed from the file server 4 (Step S8201). The file removal detection program 113 recognizes the file as a file to be removed.
In this embodiment, the file removal detection program 113 may detect that the file is to be removed from the file server 4 by receiving the removal notification from the file sharing program 411 (see Step S8103). It should be noted that the notification includes the path name of the file to be removed, the name space name, the metadata, and the like.
The file removal detection program 113 updates a record corresponding to the file to be removed of the metadata management table 153 (Step S8202).
To be specific, the file removal detection program 113 refers to the metadata management table 153 based on the information included in the received removal notification to identify the record corresponding to the file to be removed, and stores “removed” in the file status 1535 of the record.
The file removal detection program 113 executes file hiding processing on the file to be removed for the file server 4 (Step S8203). In the file hiding processing, the following processing is executed.
First, the file removal detection program 113 instructs the file server 4 that has transmitted the removal notification to execute the hiding processing on the file to be removed (Step S8204).
Receiving the instruction to execute the hiding processing, the file sharing program 411 of the file server 4 moves the file to be removed to the hidden file storage area 454. As a result, the removed file is treated as a hidden file. It should be noted that a path name of the hidden file may be automatically determined by the file sharing program 411 or the file system program 412, or may be automatically determined by the file removal detection program 113.
Next, the file removal detection program 113 updates the saved file management table 154 (Step S8205). To be specific, the following processing is executed.
The file removal detection program 113 adds a new record to the saved file management table 154, and stores the metadata ID 1531 of the record corresponding to the file to be removed in the metadata ID 1541 of the record. The file removal detection program 113 stores the path name of the hidden file in the saved path 1542, and stores in the saved name space ID 1543 an identifier of a name space in which the hidden file is stored.
This concludes the description of the hiding processing on the file to be removed.
Next, the file removal detection program 113 executes the save processing on the hidden file (Step S8206), and ends the processing (Step S8210). In the save processing on the hidden file, the following processing is executed.
First, the file removal detection program 113 calls the file save program 114, and instructs the file save program 114 to execute the save processing on the hidden file.
In a case of receiving the instruction to execute the save processing, the file save program 114 copies the hidden file in the name space on the saving storage apparatus 2 (Step S8207). The copied file becomes a saved file. At this time, as the path name of the saved file, a path name that is unique in the name space in which the saved file is stored is determined.
The file save program 114 provides a notification of completion of the save processing on the hidden file along with the information on the saved file.
Next, the file removal detection program 113 updates the saved file management table 154 based on the information included in the received completion notification (Step S8208). To be specific, the file removal detection program 113 stores the path name of the saved file in the saved path 1542 of the record added in Step S8205, and stores in the saved name space ID 1543 an identifier of a name space in which the saved file is stored.
Next, the file removal detection program 113 instructs the file server 4 to remove the hidden file (Step S8209). In a case of receiving the instruction, the file server 4 removes the hidden file from the name space corresponding to the hidden file storage area 454.
It should be noted that the file server 4 may periodically inquire of the metadata server 1 whether or not there is a file to be removed. In this case, the file removal detection program 113 may not provide the instruction to remove the hidden file.
FIG. 12 is an explanatory diagram illustrating the metadata management table 153 after the file is moved according to the first embodiment of this invention. FIG. 13 is an explanatory diagram illustrating the saved file management table 154 after the file is moved according to the first embodiment of this invention.
A description is given here as an example of a case where the file “share1/a.doc” stored in the name space “share1” of the file server 4 has been moved to the saving storage apparatus 2.
When FIGS. 6 and 12 are compared, it can be seen that the file status 1535 of the first record corresponding to the file “share1/a.doc” has been changed from “present” to “removed”. This means that the file “share1/a.doc” has become the removed file.
Moreover, when FIGS. 7 and 13 are compared, it can be seen that the second record is newly added to the saved file management table 154. The second record stores “100” in the metadata ID 1541. Therefore, it can be seen that the second record is a record storing information on the file for which the identifier of the metadata is “100”, that is, a saved file corresponding to the file “share1/a.doc”.
Moreover, referring to the saved path 1542 and the saved name space ID 1543, it can be seen that the path name of the saved file corresponding to the file “share1/a.doc” is “r/FS1/share1/a.doc”, and that the name space is identified by the saved name space ID 1543 of “n3001”, that is, the name space “r” of the saving storage apparatus 2.
FIG. 14 is a flowchart illustrating processing executed by the inquiry processing program 111 according to the first embodiment of this invention.
The inquiry processing program 111 executes processing, in a case where requested by the analysis program 61 to output a list of the files managed by the metadata server 1.
In a case where the processing is started (Step S8300), the inquiry processing program 111 receives an inquiry about the files from the analysis program 61 (Step S8301).
The inquiry may include conditions on the files to be output. The conditions may include, for example, files including a particular character string in the path name, files modified in a particular period of time, files of a particular owner, files to which a particular access right is set, files stored in a particular file server or name space, files that were stored in the particular file server or name space, or the like. Moreover, conditions on the removed file may be specified, such as being a removed file, not being a removed file, both of removed files and files that are not removed files. Further, a logical disjunction or a logical conjunction of sets of the files satisfying the above-mentioned conditions may also be specified.
The inquiry processing program 111 refers to the metadata repository 150 to generate the list 116 of the files satisfying the specified conditions on the memory 11 (Step S8302). To be specific, the inquiry processing program 111 refers to the storage management table 151, the name space management table 152, and the metadata management table 153 to generate the list 116.
FIGS. 15A and 15B are explanatory diagrams illustrating an example of a configuration of the list 116 according to the first embodiment of this invention.
The list 116 stores information on the files managed by the metadata server 1. To be specific, the list 116 includes a metadata ID 1161, a path 1162, original metadata 1163, a storage ID 1164, an IP address 1165, a name space ID 1166, a file status 1167, and save destination information 1168.
The metadata ID 1161 stores an identifier for identifying metadata. The metadata ID 1161 is the same as the metadata ID 1531.
The path 1162 stores a path indicating the location at which the file is stored. The path 1162 is the same as the path 1532.
The original metadata 1163 stores the metadata of the file. The original metadata 1163 is the same as the original metadata 1153.
The storage ID 1164 stores an identifier of a storage apparatus in which the file is stored. The storage ID 1164 is the same as the storage ID 1511.
The IP address 1165 stores an assigned IP address of the storage apparatus. The IP address 1165 is the same as the IP address 1514.
The name space ID 1166 stores an identifier used by the metadata server 1 to uniquely identify a name space. The name space ID 1166 is the same as the name space ID 1521.
The file status 1167 stores information indicating whether or not the file is present in the file server 4. The file status 1167 is the same as the file status 1535.
The save destination information 1168 stores information on a saved file. It should be noted that the save destination information 1168 does not store the information, in a case where the file is not a saved file.
The save destination information 1168 includes a saved path 11681, a storage ID 11682, an IP address 11683, and a saved name space ID 11684.
The saved path 11681 stores a path indicating the location at which the saved file is stored. The saved path 11681 is the same as the saved path 1542.
The storage ID 11682 stores an identifier of the storage apparatus in which the saved file is stored. The storage ID 11682 is the same as the storage ID 1511.
The IP address 11683 stores an assigned IP address of the storage apparatus in which the saved file is stored. The IP address 11683 is the same as the IP address 1514.
The saved name space ID 11684 stores an identifier for identifying the name space in which the saved file is stored. The saved name space ID 11684 is the same as the saved name space ID 1543.
In Step S8302, information is stored in the metadata ID 1161, the path 1162, the original metadata 1163, the storage ID 1164, the IP address 1165, the name space ID 1166, and the file status 1167.
This concludes the description of the list 116. The description returns to FIG. 14.
The inquiry processing program 111 selects one entry corresponding to the removed file from the generated list (Step S8303). To be specific, the inquiry processing program 111 selects an entry storing “removed” in the file status 1167. It should be noted that a method of selecting an entry in order from the top may be contemplated, in a case where there are a plurality of entries corresponding to removed files.
The inquiry processing program 111 refers to the saved file management table 154 to obtain information on a save destination of the removed file corresponding to the selected entry (Step S8304).
To be specific, the inquiry processing program 111 identifies a record that matches the metadata ID 1161 of the selected entry from the saved file management table 154.
The inquiry processing program 111 obtains the saved path 1542 and the saved name space ID 1543 from the identified record. Further, the inquiry processing program 111 uses the saved name space ID 1543 to obtain from the storage management table 151 and the name space management table 152 the identification name, the IP address, and the identification name of the name space of the saving storage apparatus 2 in which the saved file is stored.
Next, based on the information obtained in Step S8304, the inquiry processing program 111 updates the list 116 (Step S8305). To be specific, the information obtained in Step S8304 is stored in the save destination information 1169 of the selected entry.
The inquiry processing program 111 determines whether or not the processing is complete for entries corresponding to all the removed files included in the list 116 (Step S8306).
In a case where it is determined that the processing is not complete for the entries corresponding to all the removed files, the inquiry processing program 111 returns to Step S8303 and executes similar processing (Steps S8303 to S8306).
In a case where it is determined that the processing is complete for the entries corresponding to all the removed files, the inquiry processing program 111 transmits the generated list 116 to the analysis program 61 which has transmitted the request to output the file list, and ends the processing (Steps S8307 and S8308).
FIG. 16 is a flowchart illustrating the analytical processing on files executed by the analysis program 61 according to the first embodiment of this invention.
The analysis program 61 executes the analytical processing periodically or in accordance with a user's instruction.
In a case where the analytical processing is started (Step S8400), the analysis program 61 transmits to the inquiry processing program 111 of the metadata server 1 an inquiry about files stored in all the file servers 4 (Step S8401). The output request may include conditions on the files to be included in the list 116.
The analysis program 61 waits for a response from the metadata server 1. In other words, the analysis program 61 suspends the processing until the list 116 is transmitted from the metadata server 1.
The analysis program 61 selects one entry to be processed from the received list 116 (Step S8402). For example, a method of selecting an entry in order from the top of the list 116 may be contemplated.
The analysis program 61 obtains, based on the entry to be processed, information on a read location of the file corresponding to the entry (Step S8403). To be specific, the following processing is executed.
First, the analysis program 61 determines whether or not “removed” is stored in the file status 1167 of the selected entry. In a case where “removed” is stored in the file status 1167, it can be seen that the selected entry is an entry on a removed file.
In a case where “removed” is stored in the file status 1167, the analysis program 61 obtains information stored in the save destination information 1168. In other words, the saved path 11681, the storage ID 11682, the IP address 11683, and the saved name space ID 11684 are obtained.
In a case where “removed” is stored in the file status 1167, the analysis program 61 obtains the path 1162, the storage ID 1164, the IP address 1165, and the name space ID 1166.
This concludes the processing of Step S8403.
Next, based on the information obtained in Step S8403, the analysis program 61 reads the file corresponding to the selected entry from the storage apparatus as the read location (Step S8404).
The analysis program 61 executes predetermined analytical processing based on the content of the read file and the original metadata 1163 of the selected entry (Step S8405).
The analysis program 61 determines whether or not the processing is complete for all the entries in the obtained list 116 (Step S8406).
In a case where it is determined that the processing is not complete for all the entries, the analysis program 61 returns to Step S8402 and executes similar processing (Steps S8402 to S8406).
In a case where it is determined that the processing is complete for all the entries, the analysis program 61 ends the analytical processing (Step S8407).
It should be noted that in Step S8404, the storage apparatus in which the file is stored may be a storage apparatus that cannot be accessed by the analysis program 61. This applies, for example, to a case where a file sharing protocol for reading the file is not supported in the analysis program 61.
In this case, the analysis program 61 transmits a read request for a desired file to the file read proxy program 115. In a case of receiving the request, the file read proxy program 115 reads the file from the storage apparatus as proxy for the analysis program 61, and responds to the analysis program 61 with the read file.
Second Embodiment
Next, a second embodiment of this invention is described.
In the first embodiment, in a case of receiving from the business program 51 the request to remove a file, the file server 4 transmits the removal notification of the file to the metadata server 1 in the course of the processing. Thereafter, the file server 4 executes the hiding processing in accordance with the instruction of the metadata server 1.
The second embodiment is different in that the file server 4 transmits removal notifications of a plurality of files to the metadata server 1 at one time, in a case where requests to remove a certain number of files are received from the business program 51 or in a case where a certain period of time has elapsed since the removal notification is transmitted. Moreover, in the second embodiment, in order to transmit the removal notifications of the plurality of files at one time, in a case where a request to remove a file is received, the file server 4 automatically executes the hiding processing on the file without waiting for an instruction from the metadata server 1.
In the following, differences from the first embodiment are mainly described.
The components of the computer system 500, the components of the metadata server 1, and the tables managed by the metadata server 1 in the second embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. The file server 4 in the second embodiment is different from the file server 4 in the first embodiment in that the memory 41 newly includes a hidden file management table 415 (not shown). The other components are the same as those of the first embodiment, and hence descriptions thereof are omitted.
FIG. 17 is an explanatory diagram illustrating an example of a configuration of the hidden file management table 415 according to the second embodiment of this invention.
The hidden file management table 415 stores information on hidden files. To be specific, the hidden file management table 415 includes a path 4151, a name space ID 4152, original metadata 4153, and a hidden file path 4154.
The path 4151 stores the path name of the file before the hiding processing is executed. The name space ID 4152 stores the identification name of the name space in which the file was stored before the hiding processing is executed.
The original metadata 4153 stores the metadata of the file before the hiding processing is executed. The hidden file path 4154 stores the path name of the hidden file.
FIG. 18 is a flowchart illustrating processing executed by the file sharing program 411 according to the second embodiment of this invention.
In a case where the processing is started (Step S8600), the file sharing program 411 receives an access request to a predetermined file from the business program 51 or another program via the network 7 (Step S8601).
The file sharing program 411 determines whether or not the received access request is a request to remove the file (Step S8602).
In a case where it is determined that the received access request is not the request to remove the file, the file sharing program 411 instructs the file system program 412 to execute processing in accordance with the received access request (Step S8607). Thereafter, the file sharing program 411 transmits a response to the program that has transmitted the access request, and ends the processing (Step S8608).
In a case where it is determined that the received access request is the request to remove the file, the file sharing program 411 moves the file to be removed to the hidden file storage area 454 (Step S8603). As a result, the file to be removed is recognized by the business program 51 as having been removed.
The file sharing program 411 updates the hidden file management table 415 (Step S8604). In other words, the file sharing program 411 stores the information on the hidden file in the hidden file management table 415.
To be specific, the file sharing program 411 generates a new record, and stores in the generated record the path name, the identification name of the name space, and the metadata under which the file to be removed was stored before being moved to the hidden file storage area 454, and the path name of the hidden file. The path name of the hidden file is determined by the file sharing program 411 so as not to overlap in the hidden file management table 415.
The file sharing program 411 determines whether or not the removal notification of the file needs to be transmitted to the metadata server 1 (Step S8605). For example, in a case where a preset certain number of records or more are registered with the hidden file management table 415, or in a case where a preset period of time has elapsed from the last removal notification, the file sharing program 411 determines that the removal notification of the file needs to be transmitted.
In a case where it is determined that the removal notification of the file does not need to be transmitted to the metadata server 1, the file sharing program 411 ends the processing (Step S8608).
In a case where it is determined that the removal notification of the file needs to be transmitted to the metadata server 1, the file sharing program 411 transmits the removal notification of the file to the metadata server 1 (Step S8606). The notification includes information on all records stored in the hidden file management table 415, that is, information on all hidden files. Thereafter, the file sharing program 411 ends the processing (Step S8608).
It should be noted that the processing of Steps S8605 and S8606 is executed in the course of the processing in response to the access request from the business program 51, but the two processing steps may be periodically executed as processing independent of the processing in response to the access request.
In a case of receiving the removal notification from the file sharing program 411, the file removal detection program 113 executes the processing illustrated in FIG. 11. It should be noted, however, that when the removal notification is received, the removed file is hidden by the file server 4, and hence the processing of Step S8203 is not executed.
Third Embodiment
Next, a third embodiment of this invention is described.
The third embodiment has a feature in that the second embodiment is extended to manage, in addition to the removed file, data to be partially erased from a file due to overwrite on the file, a change in size of the file, or the like so as to be readable by the analysis program 61.
The data to be erased due to removal of the file, the overwrite on the file, or truncation of the file size is hereinafter referred to as erased data.
Moreover, a file that cannot be read from the file server 4 because the erased data is generated by the above-mentioned processing but can be obtained by inquiring of the metadata server 1 is referred to as the removed file. In particular, the file from which a part of data is erased due to the overwrite on the file or the truncation of the file size is referred to as a partially erased file.
Moreover, the file on the file server 4 in which the erased data was stored is referred to as an original file. A file for saving the erased data is referred to as a saved file. One saved file stores erased data generated in processing of one access.
In the following, differences from the first embodiment and the second embodiment are mainly described.
The components of the computer system 500 and the components of the metadata server 1 in the third embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. Moreover, the components of the file server 4 in the third embodiment are the same as those of the second embodiment, and hence descriptions thereof are omitted.
The third embodiment is different in the saved file management table 154 included in the metadata server 1 and the hidden file management table 415 included in the file server 4.
FIG. 19 is an explanatory diagram illustrating an example of a configuration of the saved file management table 154 according to the third embodiment of this invention.
The saved file management table 154 in the third embodiment is stored in the memory 11 of the metadata server 1.
The saved file management table 154 stores information for managing correspondences between the erased data and the saved file. To be specific, the saved file management table 154 includes one or more records, and each of the records includes the metadata ID 1541, the saved path 1542, the saved name space ID 1543, and an address range 1544.
Each record of the saved file management table 154 corresponds to information on the erased data generated in the processing of one access.
As compared to the saved file management table 154 in the first embodiment, the address range 1544 is newly added. The address range 1544 stores the address range of the erased data on the original file, the erased data was stored in the original file.
In a case of detecting that data has been erased in the file server 4, the metadata server 1 moves the erased data to the saved file and updates the saved file management table 154.
In the example illustrated in FIG. 19, the first record stores information on erased data in the file “/share1/b.doc”. The metadata ID 1541 stores the identifier “110” of the metadata corresponding to the file “/share1/b.doc”. Moreover, the saved path 1542 stores the path name “/r/FS1/share1/b.doc” of the location of the saved file. The saved name space ID 1543 stores the identifier “n3001” of the name space in which the saved file “/r/FS1/share1/b.doc” is stored. Further, the address range 1544 stores an address range [10,20) of the erased data in the original file “/share1/b.doc”.
FIG. 20 is an explanatory diagram illustrating an example of a configuration of the hidden file management table 415 according to the third embodiment of this invention.
The hidden file management table 415 in the third embodiment is stored in the memory 41 of the file server 4.
The hidden file management table 415 stores information for managing correspondences between the erased data and the hidden file. To be specific, the hidden file management table 415 includes one or more records, and each of the records includes the path 4151, the name space ID 4152, the original metadata 4153, the hidden file path 4154, an address range 4155, and an erasure type 4156.
Each record of the hidden file management table 415 corresponds to information on the erased data generated in the processing of one access.
As compared to the second embodiment, the address range 4155 and the erasure type 4156 are newly added. The address range 4155 stores the address range of the erased data on the original file in which the erased data was stored. The erasure type 4156 stores a reason why the erased data was generated.
In a case where the erased data was generated because the file was removed, the erasure type 4156 stores “removed”, which is information indicating that the file was removed. In a case where the erased data was generated due to the overwrite in a part of the file or the truncation of the file size, the erasure type 4156 stores “partially erased”, which is information indicating that a part of data of the file was erased.
In a case where the erased data is generated, that is, in a case of processing such as the removal of the file, the overwrite on the file, or the truncation of the file size is requested, the file server 4 reads the erased data from the original file to write the erased data in the hidden file, and updates the hidden file management table 415.
FIG. 21 is a flowchart illustrating processing executed by the file sharing program 411 according to the third embodiment of this invention.
The third embodiment is different from the second embodiment in that not only when the removal of the file is requested but also when the erased data is generated due to the overwrite on the file or the truncation of the file size, the erased data is stored in the hidden file storage area 454.
As in the second embodiment, in a case where the processing is started (Step S8700), the file sharing program 411 receives an access request to a file from the business program 51 or another program via the network 7 (Step S8701).
The file sharing program 411 determines whether or not the erased data is generated, in a case where processing corresponding to the received access request is executed (Step S8702). In other words, it is determined whether or not the received access request requests the erasure of data from the file. For example, in a case where the received access request is a request for the removal of the file, the overwrite on the file, the truncation of the file size, or the like, it is determined that the erased data is generated, in a case where the processing corresponding to the received access request is executed.
In a case where it is determined that the erased data is not generated, the file sharing program 411 proceeds to Step S8705.
In a case where it is determined that the erased data is generated, the file sharing program 411 moves the erased data to the hidden file storage area 454 (Step S8703).
To be specific, the file sharing program 411 identifies the address range of the erased data, generates a hidden file for storing the erased data in the hidden file storage area 454, and stores the erased data in the generated hidden file.
At this time, a path name of the hidden file is determined so as not to overlap with the other hidden files stored in the hidden file storage area 454.
The file sharing program 411 updates the hidden file management table 415 based on information on the generated hidden file (Step S8704).
To be specific, the file sharing program 411 adds a new record to the hidden file management table 415.
The file sharing program 411 stores the path name of the original file in the path 4151 of the added record, stores in the name space ID 4152 an identifier of a name space in which the original file is stored, and stores the metadata of the original file in the original metadata 4153.
Moreover, the file sharing program 411 stores the path name of the generated hidden file in the hidden file path 4154, and stores the address range of the erased data in the address range 4155. Further, the file sharing program 411 stores in the erasure type 4156 “removed” when the file is removed, and “partially erased” when the file is not removed.
Next, the file sharing program 411 executes the processing corresponding to the received access request on the file (Step S8705).
The file sharing program 411 determines whether or not the removal notification needs to be transmitted (Step S8706). It should be noted that the removal notification also includes a notification that the access request that generates the erased data has been received.
For example, in a case where a preset certain number of records or more are registered with the hidden file management table 415 or in a case where a preset period of time has elapsed from the last removal notification, it is determined that the removal notification needs to be transmitted.
In a case where it is determined that the removal notification, that is, the notification that the erased data has been generated does not need to be transmitted to the metadata server 1, the file sharing program 411 ends the processing (Step S8708).
In a case where it is determined that the removal notification needs to be transmitted, that is, the generation of the erased data needs to be notified to the metadata server 1, the file sharing program 411 notifies the metadata server 1 of the generation of the erased data (Step S8707). The notification includes information on all the records stored in the hidden file management table 415, that is, information on all the hidden files. Thereafter, the file sharing program 411 ends the processing (Step S8708).
It should be noted that the processing of Steps 8706 and S8707 is executed in the course of the processing in response to the access request, but may be periodically executed as processing independent of the processing in response to the access request.
FIG. 22 is a flowchart illustrating processing executed by the file removal detection program 113 according to the third embodiment of this invention.
In a case where the processing is started (Step S8800), the file removal detection program 113 detects the generation of the erased data in the file server 4 (Step S8801).
To be specific, the file removal detection program 113 may detect that the erased data has been generated in the file server 4 by receiving the removal notification that the erased data has been generated from the file server 4. It should be noted that the removal notification includes the information stored in the hidden file management table 415.
The description is given here assuming that the file removal detection program 113 executes the processing for each piece of the erased data, that is, for each record of the hidden file management table 415.
The file removal detection program 113 determines, based on the hidden file management table 415 included in the received removal notification, whether or not the erased data to be processed is generated due to the removal of the file (Step S8802). In other words, it is determined whether the file that included the erased data to be processed is the removed file or the partially erased file.
In a case where “removed” is stored in the erasure type 4156, the file removal detection program 113 determines that the erased data was generated due to the removal of the file. On the other hand, in a case where “partially erased” is stored in the erasure type 4156, the file removal detection program 113 determines that the erased data was generated due to the overwrite on the file or the truncation of the file size.
In a case where it is determined that the erased data was generated due to the removal of the file, the file removal detection program 113 identifies a record of the metadata management table 153 corresponding to the file to be processed, and stores “removed” in the file status 1535 of the record (Step S8803). Thereafter, the file removal detection program 113 proceeds to Step S8804.
In a case where it is determined that the erased data was not generated due to the removal of the file, the file removal detection program 113 adds a record corresponding to the file to be processed to the metadata management table 153 (Step S8808).
To be specific, the file removal detection program 113 stores an identifier that does not overlap with the other records in the metadata ID 1531 of the added record. The file removal detection program 113 stores the path name and the metadata of the file to be processed in the path 1532 and the original metadata 1534 of the added record, respectively. The file removal detection program 113 stores in the name space ID 1533 an identifier of a name space in which the file to be processed is stored. Moreover, the file removal detection program 113 stores “partially erased” in the file status 1535.
It should be noted that the information to be stored in the added record may be obtained based on the information included in the removal notification received from the file server 4.
The file removal detection program 113 updates the saved file management table 154 (Step S8804). To be specific, the file removal detection program 113 adds a record corresponding to the hidden file in which the erased data to be processed is stored.
The added record stores in the metadata ID 1541 the same identifier as the metadata ID 1531 of the record identified in Step S8804 or the metadata ID 1531 of the record added in Step S8808. The saved path 1542 stores the path name of the hidden file, the saved name space ID 1543 stores an identifier of a name space in which the hidden file is stored, and the address range 1544 stores the address range of the erased data stored in the hidden file. It should be noted that the information to be stored in the added record may be obtained based on the information included in the removal notification received from the file server 4.
The file removal detection program 113 moves the hidden file to the saving storage apparatus 2 (Step S8805). To be specific, the file removal detection program 113 copies the hidden file in the name space of the saving storage apparatus 2 to move the erased data to be processed to the saved file. At this time, the path name of the saved file is determined so as not to overlap with the other saved files stored in the saving storage apparatus 2.
The file removal detection program 113 updates the saved file management table 154 (Step S8806). To be specific, the file removal detection program 113 changes the saved path 1542 of the record added in Step S8804 to the path name of the saved file.
The file removal detection program 113 instructs the file server 4 to remove the hidden file (Step S8807). Thereafter, the file removal detection program 113 ends the processing (Step S8809).
FIGS. 23 and 24 are explanatory diagrams each illustrating an example of the metadata management table 153 according to the third embodiment of this invention. FIG. 25 is an explanatory diagram illustrating an example of the saved file management table 154 according to the third embodiment of this invention.
A description is given here of the metadata management table 153 and the saved file management table 154 in a case where data is overwritten on the file “/share1/a.doc” stored in the name space “share1” of the file server 4.
FIG. 23 represents the metadata management table 153 before the data is overwritten on the file “/share1/a.doc”. In the first record of the metadata management table 153, information on the file “/share1/a.doc” is recorded. It can be seen from the information stored in the record that the file “/share1/a.doc” is stored in the file server 4 and a modified time thereof is “10:00”.
FIG. 24 represents the metadata management table 153 after the data is overwritten on the file “/share1/a.doc” and the metadata server 1 has moved the erased data to the saving storage apparatus 2.
When compared to FIG. 23, the second record having the metadata ID 1531 of “101” is added. The record represents that the metadata server 1 manages the file “/share1/a.doc” at the modified time of “10:00” as the partially erased file. Therefore, the file status 1535 of the record stores “partially erased”.
Moreover, it can be seen that in the first record, the modified time is changed to “12:00” due to the overwrite of the data on the file “/share1/a.doc”.
FIG. 25 represents the saved file management table 154 after the data is overwritten on the file “/share1/a.doc” and the metadata server 1 has moved the erased data to the saving storage apparatus 2.
The first record of the saved file management table 154 of FIG. 25 stores information on the erased data and the saved file of the partially erased file corresponding to the second record of the metadata management table 153 of FIG. 24.
The metadata ID 1541 of the second record stores “100”. Therefore, it can be seen that the second record is a record relating to the erased data of the partially erased file corresponding to the second record of the metadata management table 153 of FIG. 24.
It can be seen from the saved path 1542 and the saved name space ID 1543 that the erased data is stored in the name space “r” of the saving storage apparatus 2 as a file having the path name of “A/r/s1000/share/a.doc_diff”.
It can also be seen from the address range 1544 that the erased data is data that was stored in the range of addresses “0” to “29” of the original file.
FIG. 26 is a flowchart illustrating processing executed by the file read proxy program 115 according to the third embodiment of this invention.
The file read proxy program 115 according to this embodiment receives a read request for the normal file, the removed file, or the partially erased file and responds to the requester with a content of the file. In a case where the requested file is the removed file or the partially erased file, the requested file is temporarily restored to respond with the content of the restored file.
In a case where the processing is started (Step S8900), the file read proxy program 115 receives a file read request from the analysis program 61 or the like (Step S8901). The received file read request includes information for the requester program to specify the file. For example, information such as the path name, the name space name, the metadata, or another identifier (metadata ID or i-node number in the file system) of the file is included.
The file read proxy program 115 identifies a corresponding record of the metadata management table 153 based on the information included in the received file read request (Step 8902).
The file read proxy program 115 refers to the file status 1535 of the identified record to determine whether or not the file to be read is the normal file (Step S8903).
In a case where the file status 1535 is “removed” or “partially erased”, it is determined that the file to be read is the removed file or the partially erased file. On the other hand, in a case where the file status 1535 is “present”, it is determined that the file to be read is the normal file.
In a case where it is determined that the file to be read is not the normal file but is any one of the removed file and the partially erased file, the file read proxy program 115 executes restoration processing for restoring the file to be read (Step S8904). As a result, the file is temporarily restored in the saving storage apparatus 2. It should be noted that details of the restoration processing are described later with reference to FIG. 27.
Thereafter, the file read proxy program 115 transmits the restored file to the requester, and ends the processing (Steps S8905 and S8907).
In a case where it is determined in Step S8903 that the file to be read is the normal file, the file read proxy program 115 identifies the location of the file to be read (Step S8906). To be specific, the location of the file is identified based on the identifier of the file server 4, the identifier of the name space, the path name, and the like.
Further, the file read proxy program 115 reads the file to be read from the file server 4 as the identified location to transmit the read file to the requester, and ends the processing (Steps S8905 and S8907).
FIG. 27 is a flowchart illustrating the details of the restoration processing according to the third embodiment of this invention.
In a case where the processing is started (Step S9000), the file read proxy program 115 extracts records relating to the file to be read from the metadata management table 153 (Step S9001). In this example, records of the same file to be read that are newer in time series than the record identified in Step S8903 are extracted.
To be specific, the file read proxy program 115 extracts records each having the path 1532 and the name space ID 1533 that match those of the file to be read and having a modified time included in the original metadata 1534 that is later than the modified time of the file to be read, that is, having a newer modified time.
The file read proxy program 115 determines whether or not the file to be read is currently the removed file (Step S9002). To be specific, of the extracted records, the file read proxy program 115 identifies a record for which a modified time stored in the original metadata 1534 is the latest, and determines whether or not the file status 1535 of the record is “removed”.
In a case where it is determined that the file to be read is currently the removed file, the file read proxy program 115 copies, based on the record of the removed file extracted in Step S9001, the removed file as a temporary file in a work area (Step S9003). The work area as used herein is one storage space of the saving storage apparatus 2.
On the other hand, in a case where it is determined that the file to be read is not currently the removed file but is the partially erased file, the file read proxy program 115 reads, based on the records extracted in Step S9001, the file to be read that is currently stored in the file server 4, and copies the read file as a temporary file in the work area (Step S9007).
The file read proxy program 115 selects, from among the extracted records, a record having the next newer modified time than the record identified in Step S9003 as a record to be processed (Step S9004).
The file read proxy program 115 overwrites the temporary file with removed data stored in the saved file (Step S9005). To be specific, the following processing is executed.
The file read proxy program 115 identifies, based on the information in the record selected in Step S9004, a record of a corresponding saved file from the saved file management table 154.
The file read proxy program 115 reads the saved file from the saving storage apparatus 2 based on the identified record to obtain the removed data.
The file read proxy program 115 refers to the address range 1544 of the identified record to overwrite the same address range of the temporary file with the read removed data. Moreover, the file read proxy program 115 changes a file size of the temporary file to the file size stored in the original metadata 1534 of the selected record of the metadata management table 153.
Through the above-mentioned processing, the temporary file has the same content as the file at a time when the record selected in Step S9004 is added to the metadata management table 153.
The file read proxy program 115 determines whether or not the processing is complete for all the records extracted in Step 9001 (Step S9006).
In a case where it is determined that the processing is not complete for all the records extracted in Step 9001, the file read proxy program 115 returns to Step S9004 and executes similar processing (Steps S9004 to S9006).
In a case where it is determined that the processing is not complete for all the records extracted in Step 9001, the file read proxy program 115 ends the processing (Step S9008).
It should be noted that in the third embodiment, the metadata server 1 reads the file and transmits the read file to the analysis server 6. However, this invention is not limited thereto, and the analysis server 6 may obtain the file. In this case, the following processing is executed.
In Step S8905, the file read proxy program 115 generates the list 116 and transmits the generated list 116 to the analysis server 6. It should be noted that as the method of generating the list 116, the same method as in the first embodiment is used. It should be noted that the saved path 11681 of the record corresponding to the temporary file of the list 116 stores information on a location of the temporary file in the work area.
The analysis server 6 reads the files based on the received list 116. It should be noted that this processing is the same as in the first embodiment, and hence a description thereof is omitted.
In this embodiment, each piece of the erased data is stored in one saved file or hidden file, but this invention is not limited thereto. For example, the erased data may be stored collectively in several files, or stored in a database or block storage.
Fourth Embodiment
Next, a fourth embodiment of this invention is described.
The fourth embodiment extends the first embodiment, and in a case where a file having the same content as that of the removed file is stored in the backup storage apparatus 3, the saved file corresponding to the removed file is not generated. In this manner, the number of copied files having the same content may be reduced in the computer system 500.
In the following, differences from the first embodiment are mainly described.
The components of the computer system 500, and the components of the metadata server 1 and the file server 4 in the fourth embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. Moreover, the configuration of each table managed by the metadata server 1 and the file server 4 is also the same as that of the first embodiment, and hence a description thereof is omitted.
FIG. 28 is an explanatory diagram illustrating an example of a configuration of the storage management table 151 according to the fourth embodiment of this invention.
The storage ID 1511, the storage name 1512, the type 1513, and the IP address 1514 are the same as those of the first embodiment, and hence descriptions thereof are omitted.
The fourth embodiment is different from the first embodiment in that the metadata server 1 also manages the backup storage apparatus 3 in addition to the file server 4 and the saving storage apparatus 2. In other words, the fourth record of the storage management table 151 illustrated in FIG. 28 stores information on a backup storage apparatus 3. It should be noted that the type 1513 of the record corresponding to the backup storage apparatus 3 stores “backup”.
FIG. 29 is an explanatory diagram illustrating an example of a configuration of the name space management table 152 according to the fourth embodiment of this invention.
The name space ID 1521, the name space name 1522, the storage ID 1523, the capacity 1524, the protocol 1525, the used volume 1526, and the usage 1527 are the same as those of the first embodiment, and hence descriptions thereof are omitted.
As illustrated in FIG. 29, the fifth record of the name space management table 152 stores information on a name space in the backup storage apparatus 3. It should be noted that the usage 1527 of the record corresponding to the backup storage apparatus 3 stores “backup”.
FIG. 30 is an explanatory diagram illustrating an example of a configuration of the metadata management table 153 according to the fourth embodiment of this invention.
In the fourth embodiment, the metadata management table 153 is stored in the memory 11 of the metadata server 1.
The metadata management table 153 in the fourth embodiment is different from the first embodiment in that a hash value 1536 is added. The hash value 1536 stores a hash value representing the content of the file corresponding to the entry. The hash value as used herein is a value obtained by applying a predefined hash function to the content of the file. For example, as the hash function, various known algorithms (for example, SHA256) may be used.
In this embodiment, it is determined whether or not the contents of the files are the same based on the hash value 1536.
In the example illustrated in FIG. 30, the fourth record of the metadata management table 153 stores information on a file “/BU/x.doc” stored in the backup storage apparatus 3. The file stored in the backup storage apparatus 3 is hereinafter referred to as a backup file.
Moreover, the file status 1535 of an entry corresponding to the backup file stores “BU”, which represents that the file corresponding to the entry is the backup file. Moreover, it can be seen in the hash value 1536 of the record that a hash value calculated based on the file “/BU/x.doc” is “e001”. It is assumed here that the hash value is a value represented in hexadecimal notation.
In order to store the information on the backup file in the metadata management table 153, the metadata management program 112 in this embodiment inquires of the backup program 31 of the backup storage apparatus 3 to obtain metadata of the backup file stored in the backup storage apparatus 3. Moreover, the metadata management program 112 may read a database or the like holding a list of backup files managed by the backup program 31.
The hash value of the backup file may be calculated by the metadata management program 112, in a case where the metadata management program 112 reads the backup file from the backup storage apparatus 3, or may be calculated by the backup program 31 and transmitted to the metadata management program 112.
FIG. 31 is a flowchart illustrating processing executed by the file removal detection program 113 according to the fourth embodiment of this invention.
In a case of detecting the file to be removed, the file removal detection program 113 in the fourth embodiment determines whether or not there is a backup file having the same content as that of the file. In a case where there is a backup file having the same content, the file removal detection program 113 adds the backup file as the saved file corresponding to the file to be removed to the saved file management table 154. Further, the file removal detection program 113 removes the file to be removed without generating the hidden file in the file server 4.
In a case where the processing is started (Step S9100), the file removal detection program 113 detects that a file is to be removed from the file server 4 (Step S9101).
The processing of Step S9101 is the same processing as Step S8201. It should be noted, however, that in the fourth embodiment, the removal notification transmitted from the file server 4 includes the hash value of the file to be removed.
It should be noted that the hash value of the file to be removed may be calculated by the file removal detection program 113 by applying the hash function to the file to be removed read from the file server 4.
The file removal detection program 113 updates a record corresponding to the file to be removed of the metadata management table 153 (Step S9102). The processing of Step S9202 is the same processing as Step S8202.
The file removal detection program 113 refers to the metadata management table 153 to search for a backup file having the same content as that of the file to be removed (Step S9103). To be specific, the following processing is executed.
The file removal detection program 113 obtains the hash value 1536 of the file to be removed.
Next, the file removal detection program 113 extracts an entry having “BU” stored in the file status 1535, and compares a hash value 1536 of the extracted entry and the hash value 1536 of the file to be removed. The entry matching the hash value 1536 of the file to be removed is the backup file having the same content as that of the file to be removed.
It should be noted that a method of determining the content of the file is not limited to the above-mentioned method. For example, a method of comparing the metadata of the files, a method of comparing file sizes, a method combining those methods, or the like may be used.
As a result of the search processing described above, the file removal detection program 113 determines whether or not there is a backup file having the same content as that of the file to be removed (Step S9104).
In a case where it is determined that there is no backup file having the same content as that of the file to be removed, the file removal detection program 113 executes the file hiding processing on the file to be removed with respect to the file server 4 (Step S9106).
Further, the file removal detection program 113 instructs the file server 4 that has provided the notification of the removal of the file to execute the hiding processing of the file to be removed (Step S9107), and ends the processing (Step S9108).
It should be noted that the processing of Steps S9106 and S9107 is the same processing as Steps S8203 and S8204, and hence a description thereof is omitted.
In a case where it is determined in Step S9104 that there is a backup file having the same content as that of the file to be removed, the file removal detection program 113 updates the saved file management table 154 and ends the processing (Steps S9105 and S9108).
To be specific, the file removal detection program 113 adds the information on the backup file as information on the saved file corresponding to the file to be removed to the saved file management table 154.
In other words, a value of the metadata ID 1531 of a record corresponding to the backup file is stored in the metadata ID 1541, and the path name of the path 1532 of the record corresponding to the backup file is stored in the saved path 1542. Moreover, an identifier of the name space ID 1533 of the record corresponding to the backup file is stored in the saved name space ID 1543.
In the above-mentioned processing, the files stored in the backup storage apparatus 3 are searched for the file having the same content as that of the file to be removed, but in addition thereto, all the storage apparatus managed by the metadata server 1 may be searched.
Fifth Embodiment
Next, a fifth embodiment of this invention is described. In the fifth embodiment, the file server 4 does not transmit the removal notification of the file to the metadata server 1, in a case where removal of a file is requested from the business program 51. Therefore, the metadata server 1 periodically determines whether or not a file has been removed from the file server 4. For the determination, a snapshot function of the file server 4 is used.
In the following, differences from the first embodiment are mainly described.
The components of the computer system 500, and the components of the metadata server 1 and the file server 4 in the fifth embodiment are the same as those of the first embodiment, and hence descriptions thereof are omitted. It should be noted that the fifth embodiment is different in that the file server 4 has the snapshot function. Moreover, the configuration of each table managed by the metadata server 1 and the file server 4 is also the same as that of the first embodiment, and hence a description thereof is omitted.
FIGS. 32A and 32B are flowcharts illustrating processing executed by the metadata management program 112 according to the fifth embodiment of this invention.
In this embodiment, the metadata management program 112 collects the metadata of the files stored in the file server 4, and detects a file removed from the file server 4 and moves the file to the saving storage apparatus 2.
In a case where the processing is started (Step S9200), the metadata management program 112 instructs the file server 4 to generate a snapshot of the name space from which the metadata is to be collected (Step S9201). In a case of receiving the instruction, the file server 4 generates the snapshot of the specified name space.
The metadata management program 112 selects one file to be processed from among files included in the generated snapshot (Step S9202). The processing of Step 9202 is different from the processing of Step S8002 (see FIG. 9) in that a file included in the snapshot is selected.
The metadata management program 112 obtains metadata of the selected file from the file server 4 (Step S9203).
The metadata management program 112 updates the metadata management table 153 based on the obtained metadata (Step S9204). The processing of Step S9204 is the same processing as the processing of Step S8004 (see FIG. 9).
The metadata management program 112 determines whether or not the processing is complete for all the files included in the snapshot (Step S9205).
In a case where it is determined that the processing is not complete for all the files included in the snapshot, the metadata management program 112 returns to Step S9202 and executes similar processing (Steps S9202 to S9205).
In a case where it is determined that the processing is complete for all the files included in the snapshot, the metadata management program 112 extracts, from among the records of the metadata management table 153, records that have not been updated in the processing of Steps S9201 to S9205 (Step S9206).
The metadata management program 112 selects one record to be processed from among the extracted records (Step S9207).
The metadata management program 112 determines whether or not a file corresponding to the record to be processed is included in the snapshot (Step S9208).
In a case where it is determined that the file corresponding to the record to be processed is included in the snapshot, the metadata management program 112 proceeds to Step S9212.
In a case where it is determined that the file corresponding to the record to be processed is not included in the snapshot, the metadata management program 112 updates the record to be processed (Step S9209). To be specific, the metadata management program 112 stores “removed” in the file status 1535 of the record to be processed.
This indicates that the file corresponding to the record to be processed is a file that has been removed before the snapshot is generated. Therefore, the file is managed as a removed file.
The metadata management program 112 obtains the file corresponding to the record to be processed from the snapshot of the previous generation of the snapshot generated in Step S9201 (Step S9210). The snapshot of the previous generation is generated in this processing executed last time. It should be noted that the snapshot of the previous generation may be stored in the file server 4 or in the saving storage apparatus 2.
The metadata management program 112 moves the file obtained from the snapshot of the previous generation as the saved file of the removed file corresponding to the record to be processed to the saving storage apparatus 2 (Step S9211).
The metadata management program 112 updates the saved file management table 154 (Step S9212). The processing of Step S9212 is the same processing as the processing of Step S8208 (see FIG. 11C).
The metadata management program 112 determines whether or not the processing is complete for all the records extracted in Step S9206 (Step S9213).
In a case where it is determined that the processing is not complete for all the records extracted in Step S9206, the metadata management program 112 returns to Step S9207 and executes similar processing (Steps S9207 to S9213).
In a case where it is determined that the processing is complete for all the records extracted in Step S9206, the metadata management program 112 instructs the file server 4 to remove the snapshot of the previous generation, and ends the processing (Steps S9214 and S9215). In a case of receiving the instruction, the file server 4 removes the specified snapshot.
In this embodiment, the file server 4 does not need to provide a notification of the removal of the file, and hence even a file server 4 not having the function of providing the notification of the removal of the file may move the removed file to the saving storage apparatus 2.
In any embodiment of this invention, the hidden file is removed under the instruction of the metadata server 1. This is to prevent, even when a failure occurs in the file server 4, the metadata server 1, or the network 7 and the file save processing that is being executed is stopped, the hidden file from being removed by the file server 4 before completion of movement of the file to the saving storage apparatus 2 by the metadata server 1.
Moreover, in a case where a failure occurs in the metadata server 1 or the network 7 and the file server 4 cannot notify the metadata server 1 of the removal of the file, the file server 4 detects the failure and delays the notification of the file removal until the communication with the metadata server 1 is resumed.
In the first embodiment, in a case where the file server 4 detects that the communication to/from the metadata server 1 is disabled, the file server 4 may continue the operation by switching to the notification method of the file removal in the second embodiment.
Though the detailed description has been given of this invention referring to the attached drawings, this invention is not limited to this specific configuration, and includes various variations and equivalent configurations within the scope of the accompanying claims.

Claims (17)

What is claimed is:
1. A computer system, comprising:
a file server configured to manage a plurality of files;
a metadata server configured to manage a plurality of piece of metadata of the plurality of files;
a business server configured to use the plurality of files to execute predetermined business processing,
the file server, the metadata server, and the business server being coupled to each other via a network,
the file server including a first processor, a first memory coupled to the first processor, a first network interface coupled to the first processor, and a first storage medium coupled to the first processor, and configured to store the plurality of files,
the metadata server including a second processor, a second memory coupled to the second processor, a second network interface coupled to the second processor, and a second storage medium coupled to the second processor,
the business server including a third processor, a third memory coupled to the third processor, and a third network interface coupled to the third processor,
the metadata server being coupled to a storage apparatus including a controller and a plurality of storage media, and configured to provide a save area for storing at least one file that is removed from the file server,
the second storage medium storing a metadata repository for managing at least one of the plurality of piece of metadata of the plurality of files and at least one location of one of the plurality of files stored in the save area,
the metadata server being configured to:
store the one of the plurality of files as a saved file in the save area, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server; and
store information indicating a location of the one of the plurality of files in the file server and information indicating the location of the saved file in the save area in association with each other in the metadata repository,
wherein the computer system further comprises an analysis server configured to execute predetermined analytical processing on the plurality of files,
wherein the analysis server includes a fourth processor, a fourth memory coupled to the fourth processor, and a fourth network interface coupled to the fourth processor,
wherein the metadata server identifies a location of a file to be read in response to an inquiry request for the file, and notifies the analysis server of the identified location of the file to be read, in a case of receiving the inquiry request for the plurality of files from the analysis server,
wherein the analysis server obtains the file to be read from one of the file server and the save area to execute the predetermined analytical processing, based on the notification received from the metadata server,
wherein the file server includes a first storage space allocated to the file server, the metadata server, the business server, and the analysis server, and a second storage space allocated to the file server, the metadata server, and the analysis server,
wherein the one of the plurality of files before being removed is stored in the first storage space,
wherein the file server detects that the one of the plurality of files is to be removed from the file server by the predetermined business processing executed by the business server, and moves the one of the plurality of files from the first storage space to the second storage space, and
wherein the metadata server is configured to:
obtain the one of the plurality of files stored in the second storage space and store the obtained one of the plurality of files as the saved file in the save area;
store, as the information indicating the location of the one of the plurality of files in the file server, information indicating a location of the one of the plurality of files in the first storage space, in the metadata repository; and
transmit an instruction to remove the one of the plurality of files to the file server, and
wherein the file server removes the one of the plurality of files from the second storage space, in a case of receiving the instruction to remove.
2. The computer system according to claim 1, wherein the metadata server is configured to:
generate, based on the information stored in the metadata repository, list information including information on locations of the one of the plurality of files stored in the file server and the saved file stored in the save area, in a case of receiving the inquiry request for the plurality of files; and
transmit the generated list information to the analysis server.
3. The computer system according to claim 1,
wherein the file server transmits a notification that the one of the plurality of files is to be removed to the metadata server, in a case of detecting that the one of the plurality of files is to be removed from the file server by the predetermined business processing executed by the business server, and
wherein the metadata server detects that the one of the plurality of files is to be removed from the file server by receiving the notification from the file server.
4. The computer system according to claim 3, wherein, the file server transmits a notification that at least one of the plurality of files has been removed to the metadata server, one of in a case of detecting that a predetermined number of the plurality of files are to be removed from the file server, and in a case where a predetermined period of time has elapsed since last transmission of the notification that the one of the plurality of files is to be removed.
5. The computer system according to claim 1,
wherein the plurality of files include a plurality of pieces of data,
wherein the file server is configured to:
determine whether removed data is generated, the removed data is data to be removed from the one of the plurality of files by the predetermined business processing executed by the business server; and
move the removed data included in the one of the plurality of files to the second storage space, in a case where it is determined that the removed data is generated, and
wherein the metadata server stores the removed data, which is stored in the second storage space, as the saved file in the save area.
6. The computer system according to claim 5, wherein the metadata server is configured to:
refer to the metadata repository to determine whether there is the removed data corresponding to the file to be read, in a case of receiving the inquiry request for the plurality of files from the analysis server;
read the file to be read stored in the file server, in a case where it is determined that there is the removed data corresponding to the file to be read;
restore the file to be read by obtaining the saved file corresponding to the removed data stored in the save area and overwriting the read file to be read with the removed data obtained from the saved file; and
transmit the restored file to be read to the analysis server.
7. The computer system according to claim 1,
wherein the computer system further comprises a backup storage apparatus including a controller and a plurality of storage media, for storing backup files of the plurality of files stored in the file server, and
wherein the metadata server is configured to:
determine whether the backup storage apparatus stores a backup file having the same content as that of the one of the plurality of files to be removed, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server; and
store a location of the backup file as the location of the saved file in the metadata repository, in a case where it is determined that the backup storage apparatus stores the backup file having the same content as that of the one of the plurality of files to be removed.
8. The computer system according to claim 1,
wherein the file server has a snapshot generating function for generating a snapshot recording a status of the file server at an arbitrary time point, and
wherein the metadata server is configured to:
transmit, to the file server, an instruction to generate a first snapshot recording a current status of the file server;
refer to the generated first snapshot to update the plurality of piece of metadata stored in the metadata repository;
extract at least one of the plurality of piece of metadata that is not updated from the plurality of piece of metadata to determine whether there is a file corresponding to the extracted at least one of the plurality of piece of metadata in the first snapshot;
obtain a second snapshot that precedes the first snapshot in time series, and obtain the file corresponding to the extracted at least one of the plurality of piece of the metadata from the second snapshot, in a case where it is determined that there is no file corresponding to the extracted at least one piece of the metadata in the first snapshot; and
store the obtained file as the saved file in the save area.
9. A file management method for a computer system,
the computer system including a file server for managing a plurality of files, a metadata server for managing a plurality of piece of metadata of the plurality of files, a business server for using the plurality of files to execute predetermined business processing, and an analysis server for executing predetermined analytical processing on the plurality of files,
the file server, the metadata server, the business server, and the analysis server being coupled to each other via a network,
the file server including a first processor, a first memory coupled to the first processor, a first network interface coupled to the first processor, and a first storage medium coupled to the first processor, for storing the plurality of files,
the metadata server including a second processor, a second memory coupled to the second processor, a second network interface coupled to the second processor, and a second storage medium coupled to the second processor,
the business server including a third processor, a third memory coupled to the third processor, and a third network interface coupled to the third processor,
the analysis server including a fourth processor, a fourth memory coupled to the fourth processor, and a fourth network interface coupled to the fourth processor,
the metadata server being coupled to a storage apparatus including a controller and a plurality of storage media, for providing a save area for storing at least one file that is removed from the file server,
the second storage medium storing a metadata repository for managing at least one of the plurality of piece of metadata of the plurality of files and at least one location of one of the plurality of files stored in the save area,
the file management method comprising:
a first step of storing, by the metadata server, the one of the plurality of files as a saved file in the save area, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server;
a second step of storing, by the metadata server, information indicating a location of the one of the plurality of files in the file server and information indicating the location of the saved file in the save area in association with each other in the metadata repository;
a third step of identifying, by the metadata server, a location of a file to be read in response to an inquiry request for the plurality of files, and notifying the analysis server of the identified location of the file to be read, in a case of receiving the inquiry request for the plurality of files from the analysis server; and
a fourth step of obtaining, by the analysis server, the file to be read from one of the file server and the save area to execute the predetermined analytical processing, based on the notification received from the metadata server,
wherein the file server includes a first storage space allocated to the file server, the metadata server, the business server, and the analysis server, and a second storage space allocated to the file server, the metadata server, and the analysis server,
wherein the one of the plurality of files before being removed is stored in the first storage space,
wherein the first step further includes:
detecting, by the file server, that the one of the plurality of files is to be removed from the file server by the predetermined business processing executed by the business server, and moving the one of the plurality of files from the first storage space to the second storage space; and
obtaining, by the metadata server, the one of the plurality of files stored in the second storage space and storing the obtained one of the plurality of files as the saved file in the save area, and
wherein the second step further includes:
storing, by the metadata server, as the information indicating the location of the one of the plurality of files in the file server, information indicating a location of the one of the plurality of files in the first storage space, in the metadata repository;
transmitting, by the metadata server, an instruction to remove the one of the plurality of files to the file server; and
removing, by the file server, the one of the plurality of files from the second storage space, in a case of receiving the instruction to remove.
10. The file management method according to claim 9, wherein the third step includes:
generating, by the metadata server, list information including information on locations of the plurality of files stored in the file server and the saved file stored in the save area based on the information stored in the metadata repository; and
transmitting, by the metadata server, the generated list information to the analysis server.
11. The file management method according to claim 9, wherein the first step includes detecting that the one of the plurality of files is to be removed from the file server by receiving a notification that the one of the plurality of files is to be removed transmitted from the file server.
12. The file management method according to claim 11, further including transmitting, by the file server, a notification that at least one of the plurality of files has been removed to the metadata server, one of in a case of detecting that a predetermined number of the plurality of files are to be removed from, and in a case where a predetermined period of time has elapsed since last transmission of the notification that the one of the plurality of files is to be removed.
13. The file management method according to claim 9,
wherein the plurality of files include a plurality of pieces of data, and
wherein the first step includes:
determining, by the file server, whether removed data is generated, being data to be removed from the one of the plurality of files by the predetermined business processing executed by the business server;
moving, by the file server, the removed data included in the one of the plurality of files to the second storage space, in a case where it is determined that the removed data is generated; and
storing, by the metadata server, the removed data, which is stored in the second storage space, as the saved file in the save area.
14. The file management method according to claim 13, wherein the third step includes:
referring, by the metadata server, to the metadata repository to determine whether there is the removed data corresponding to the file to be read;
reading, by the metadata server, the file to be read stored in the file server, in a case where it is determined that there is the removed data corresponding to the file to be read;
restoring, by the metadata server, the file to be read by obtaining the saved file corresponding to the removed data stored in the save area and overwriting the read file to be read with the removed data obtained from the saved file; and
transmitting, by the metadata server, the restored file to be read to the analysis server.
15. The file management method according to claim 9,
wherein the computer system further includes a backup storage apparatus including a controller and a plurality of storage media, for storing backup files of the plurality of files stored in the file server,
wherein the first step includes determining, by the metadata server, whether the backup storage apparatus stores a backup file having the same content as that of the one of the plurality of files to be removed, in a case of detecting that the one of the plurality of files stored in the file server is to be removed by the predetermined business processing executed by the business server, and
wherein the second step includes storing, by the metadata server, a location of the backup file as the location of the saved file in the metadata repository, in a case where it is determined that the backup storage apparatus stores the backup file having the same content as that of the one of the plurality of files to be removed.
16. The file management method according to claim 9,
wherein the file server has a snapshot generating function for generating a snapshot recording a status of the file server at an arbitrary time point,
wherein the first step includes:
transmitting, by the metadata server, to the file server, an instruction to generate a first snapshot recording a current status of the file server;
referring, by the metadata server, to the generated first snapshot to update the plurality of piece of metadata stored in the metadata repository; and
extracting, by the metadata server, at least one of the plurality of piece of metadata that is not updated from the plurality of piece of metadata to determine whether there is a file corresponding to the extracted at least one of the plurality of piece of metadata in the first snapshot, and
wherein the second step includes:
obtaining, by the metadata server, a second snapshot that precedes the first snapshot in time series, and obtaining the file corresponding to the extracted at least one of the plurality of piece of metadata from the second snapshot, in a case where it is determined that there is no file corresponding to the extracted at least one of the plurality of piece of metadata in the first snapshot; and
storing, by the metadata server, the obtained file as the saved file in the save area.
17. A metadata server, comprising:
a processor;
a memory coupled to the processor;
a network interface coupled to the processor; and
a local storage coupled to the processor, and configured to manage a plurality of piece of metadata of a plurality of files stored in a file server coupled via a network,
the metadata server being coupled to an analysis server for executing predetermined analytical processing on the plurality of files, and a saving storage apparatus configured to store at least one file that is removed from the file server,
the memory storing a metadata management program for managing the plurality of piece of metadata, a file removal detection program for detecting that the one of the plurality of files is to be removed from the file server, a file save program for moving the one of the plurality of files to be removed from the file server to the saving storage, and an inquiry processing program for processing an inquiry request for the plurality of files from the analysis server,
the local storage storing a metadata repository including a metadata management table for managing the plurality of piece of metadata of the plurality of files, and a saved file management table for managing the one of the plurality of files stored in the save area,
the processor executing the metadata management program obtaining the plurality of piece of metadata of the plurality of files stored in the file server to update the metadata management table,
the processor executing the file removal detection program detecting that the one of the plurality of files stored in the file server is to be removed,
the processor executing the file save program copying the one of the plurality of files as a saved file in the saving storage apparatus,
the processor executing the file save program storing information indicating a location of the saved file in the saving storage apparatus, in the saved file management table,
the processor executing the inquiry processing program identifying, a location of a file to be read in response to the inquiry request for the plurality of files and generating a list including the identified location of the file to be read, in a case of receiving the inquiry request for the plurality of files,
the processor executing the inquiry processing program transmitting the generated list to the analysis server, and
wherein the file server includes a first storage space allocated to the file server, the metadata server, a business server, and the analysis server, and a second storage space allocated to the file server, the metadata server, and the analysis server,
wherein the one of the plurality of files before being removed is stored in the first storage space,
wherein the file server is configured to detect that the one of the plurality of files is to be removed from the file server by a predetermined business processing executed by the business server, and move the one of the plurality of files from the first storage space to the second storage space; and
wherein the metadata server is configured to:
obtain the one of the plurality of files stored in the second storage space and store the obtained one of the plurality of files as the saved file in the save area,
store, as the information indicating the location of the one of the plurality of files in the file server, information indicating a location of the one of the plurality of files in the first storage space, in the metadata repository, and
transmit an instruction to remove the one of the plurality of files from the second storage space to the file server,
wherein the file server removes the one of the plurality of files from the second storage space, in a case of receiving the instruction to remove.
US14/003,972 2011-09-21 2011-09-21 Computer system, file management method and metadata server Expired - Fee Related US9396198B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/071437 WO2013042218A1 (en) 2011-09-21 2011-09-21 Computer system, file management method and metadata server

Publications (2)

Publication Number Publication Date
US20140040331A1 US20140040331A1 (en) 2014-02-06
US9396198B2 true US9396198B2 (en) 2016-07-19

Family

ID=47914030

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/003,972 Expired - Fee Related US9396198B2 (en) 2011-09-21 2011-09-21 Computer system, file management method and metadata server

Country Status (5)

Country Link
US (1) US9396198B2 (en)
EP (1) EP2759942A4 (en)
JP (1) JP5697754B2 (en)
CN (1) CN103460197A (en)
WO (1) WO2013042218A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858013B1 (en) * 2014-05-05 2018-01-02 EMC IP Holding Company LLC Scalable distributed storage system infrastructure
US11106378B2 (en) 2018-11-21 2021-08-31 At&T Intellectual Property I, L.P. Record information management based on self describing attributes

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2783223C (en) * 2012-07-19 2014-07-15 Microsoft Corporation Global recently used files list
US9384208B2 (en) * 2013-01-22 2016-07-05 Go Daddy Operating Company, LLC Configuring a cached website file removal using a pulled data list
JPWO2014122733A1 (en) * 2013-02-06 2017-01-26 株式会社日立製作所 Computer, data access management method and recording medium
US9292507B2 (en) * 2013-08-16 2016-03-22 Vmware, Inc. Automated document revision trimming in a collaborative multi-user document store
US10191965B2 (en) 2013-08-16 2019-01-29 Vmware, Inc. Automatically determining whether a revision is a major revision or a minor revision by selecting two or more criteria, determining if criteria should be weighted and calculating a score has exceeded a threshold
US20170039376A1 (en) 2015-08-05 2017-02-09 Dell Products L.P. Systems and methods for providing secure data
US10250433B1 (en) * 2016-03-25 2019-04-02 WatchGuard, Inc. Method and system for peer-to-peer operation of multiple recording devices
US10831381B2 (en) 2016-03-29 2020-11-10 International Business Machines Corporation Hierarchies of credential and access control sharing between DSN memories
US10769116B2 (en) * 2016-06-10 2020-09-08 Apple Inc. System and method for performing operations on a hierarchy of content
CN106446155A (en) * 2016-09-22 2017-02-22 北京百度网讯科技有限公司 Method and device for cleansingdata in cloud storage system
US11126740B2 (en) 2016-11-04 2021-09-21 Microsoft Technology Licensing, Llc Storage isolation for containers
US11856331B1 (en) * 2017-05-10 2023-12-26 Waylens, Inc. Extracting and transmitting video analysis metadata for a remote database
CN108595503A (en) * 2018-03-19 2018-09-28 网宿科技股份有限公司 Document handling method and server
US11347881B2 (en) * 2020-04-06 2022-05-31 Datto, Inc. Methods and systems for detecting ransomware attack in incremental backup
CN110569146B (en) * 2019-08-27 2023-12-01 深圳震有科技股份有限公司 Data backup and configuration method, device, storage medium and system
CN112286448B (en) * 2020-10-16 2022-10-14 杭州宏杉科技股份有限公司 Object access method and device, electronic equipment and machine-readable storage medium

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120763A1 (en) * 2001-01-11 2002-08-29 Z-Force Communications, Inc. File switch and switched file system
US20040153481A1 (en) * 2003-01-21 2004-08-05 Srikrishna Talluri Method and system for effective utilization of data storage capacity
US20050267929A1 (en) * 2004-06-01 2005-12-01 Hitachi, Ltd. Method of dynamically balancing workload of a storage system
US20060161518A1 (en) * 2005-01-20 2006-07-20 Francesco Lacapra Scalable system for partitioning and accessing metadata over multiple servers
US20060190454A1 (en) * 2005-02-21 2006-08-24 Hiroki Kato Network system, element thereof and network visualization method
US20060271604A1 (en) * 2003-07-08 2006-11-30 Shoens Kurt A Management of file system snapshots
US20070136391A1 (en) * 2005-12-09 2007-06-14 Tomoya Anzai Storage system, NAS server and snapshot acquisition method
US20070156659A1 (en) * 2005-12-29 2007-07-05 Blue Jungle Techniques and System to Deploy Policies Intelligently
US20070185917A1 (en) * 2005-11-28 2007-08-09 Anand Prahlad Systems and methods for classifying and transferring information in a storage network
JP2008017049A (en) 2006-07-04 2008-01-24 Canon Inc Image forming apparatus, image formation system, and file managing method
US20080183802A1 (en) 2007-01-30 2008-07-31 Microsoft Corporation Network recycle bin
US20090177718A1 (en) * 2002-03-19 2009-07-09 Hugo Patterson System and method for managing a plurality of snapshots
US20090216774A1 (en) * 2008-02-27 2009-08-27 Ocarina Networks Virtualization of metadata for file optimization
US20100036851A1 (en) * 2008-08-08 2010-02-11 Roland Paterson-Jones Managing access of multiple executing programs to non-local block data storage
JP2010061268A (en) 2008-09-02 2010-03-18 Ntt Docomo Inc Data backup device, data restoration device and terminal management system
US20100088349A1 (en) * 2008-09-22 2010-04-08 Riverbed Technology, Inc. Virtual file system stack for data deduplication
US20100088282A1 (en) * 2008-10-06 2010-04-08 Hitachi, Ltd Information processing apparatus, and operation method of storage system
US20100106933A1 (en) * 2008-10-27 2010-04-29 Netapp, Inc. Method and system for managing storage capacity in a storage network
US20100115008A1 (en) * 2005-09-27 2010-05-06 Yoji Nakatani File system migration in storage system
US7827201B1 (en) * 2007-04-27 2010-11-02 Network Appliance, Inc. Merging containers in a multi-container system
US20100299306A1 (en) 2009-05-22 2010-11-25 Hitachi, Ltd. Storage system having file change notification interface
US20110047195A1 (en) * 2006-03-30 2011-02-24 Vmware, Inc. Method of universal file access for a heterogeneous computing environment
JP2011090531A (en) 2009-10-23 2011-05-06 Hitachi-Lg Data Storage Inc Information storage device
US20140108474A1 (en) * 2012-10-16 2014-04-17 Rackspace Us, Inc. System and Method for Exposing Cloud Stored Data to a Content Delivery Network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7013681B1 (en) * 2004-11-19 2006-03-21 Milliken & Company Edgecomb resistant weft insertion warp knit fabric
CN201061268Y (en) * 2007-06-14 2008-05-21 蔡忠广 Magic bra

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120763A1 (en) * 2001-01-11 2002-08-29 Z-Force Communications, Inc. File switch and switched file system
US20090177718A1 (en) * 2002-03-19 2009-07-09 Hugo Patterson System and method for managing a plurality of snapshots
US20040153481A1 (en) * 2003-01-21 2004-08-05 Srikrishna Talluri Method and system for effective utilization of data storage capacity
US20060271604A1 (en) * 2003-07-08 2006-11-30 Shoens Kurt A Management of file system snapshots
US20050267929A1 (en) * 2004-06-01 2005-12-01 Hitachi, Ltd. Method of dynamically balancing workload of a storage system
US20060161518A1 (en) * 2005-01-20 2006-07-20 Francesco Lacapra Scalable system for partitioning and accessing metadata over multiple servers
US20060190454A1 (en) * 2005-02-21 2006-08-24 Hiroki Kato Network system, element thereof and network visualization method
US20100115008A1 (en) * 2005-09-27 2010-05-06 Yoji Nakatani File system migration in storage system
US20070185917A1 (en) * 2005-11-28 2007-08-09 Anand Prahlad Systems and methods for classifying and transferring information in a storage network
US20070136391A1 (en) * 2005-12-09 2007-06-14 Tomoya Anzai Storage system, NAS server and snapshot acquisition method
US20070156659A1 (en) * 2005-12-29 2007-07-05 Blue Jungle Techniques and System to Deploy Policies Intelligently
US20110047195A1 (en) * 2006-03-30 2011-02-24 Vmware, Inc. Method of universal file access for a heterogeneous computing environment
JP2008017049A (en) 2006-07-04 2008-01-24 Canon Inc Image forming apparatus, image formation system, and file managing method
US20080183802A1 (en) 2007-01-30 2008-07-31 Microsoft Corporation Network recycle bin
US7827201B1 (en) * 2007-04-27 2010-11-02 Network Appliance, Inc. Merging containers in a multi-container system
US20090216774A1 (en) * 2008-02-27 2009-08-27 Ocarina Networks Virtualization of metadata for file optimization
US20100036851A1 (en) * 2008-08-08 2010-02-11 Roland Paterson-Jones Managing access of multiple executing programs to non-local block data storage
JP2010061268A (en) 2008-09-02 2010-03-18 Ntt Docomo Inc Data backup device, data restoration device and terminal management system
US20100088349A1 (en) * 2008-09-22 2010-04-08 Riverbed Technology, Inc. Virtual file system stack for data deduplication
US20100088282A1 (en) * 2008-10-06 2010-04-08 Hitachi, Ltd Information processing apparatus, and operation method of storage system
US20100106933A1 (en) * 2008-10-27 2010-04-29 Netapp, Inc. Method and system for managing storage capacity in a storage network
US20100299306A1 (en) 2009-05-22 2010-11-25 Hitachi, Ltd. Storage system having file change notification interface
JP2010271963A (en) 2009-05-22 2010-12-02 Hitachi Ltd Storage system with file change notification interface
JP2011090531A (en) 2009-10-23 2011-05-06 Hitachi-Lg Data Storage Inc Information storage device
US20140108474A1 (en) * 2012-10-16 2014-04-17 Rackspace Us, Inc. System and Method for Exposing Cloud Stored Data to a Content Delivery Network

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Akturk, Ismail; Asynchronous Replication of Metadata Across Multi-master Servers in Distributed Data Storage Systems; Dec. 2009; pp. i-ix, 1-61; , Retrieved from the Internet: .
Akturk, Ismail; Asynchronous Replication of Metadata Across Multi-master Servers in Distributed Data Storage Systems; Dec. 2009; pp. i-ix, 1-61; , Retrieved from the Internet: <URL: http://etd.1su.edu/docs/available/etd-11042009-151525/>.
European Patent Office extended search report on application 11872681.9 dated Apr. 7, 2015; 15 pages.
Fetterly, Dennis, et al.; TidyFS: A Simple and Small Distributed File System; Oct. 10, 2010; pp. 1-7; Microsoft Research Technical Report MSR-TR-2010-124.
Oriani, Andre, et al.; The Search for a Highly-Available Hadoop Distributed Filesystem; Aug. 2010; pp. 1-27; Technical Report IC-10-24.
PCT International Search Report on application PCT/JP2011/071437 mailed Oct. 18, 2011; 1 page.

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858013B1 (en) * 2014-05-05 2018-01-02 EMC IP Holding Company LLC Scalable distributed storage system infrastructure
US9864527B1 (en) * 2014-05-05 2018-01-09 EMC IP Holding Company LLC Distributed data storage management
US11106378B2 (en) 2018-11-21 2021-08-31 At&T Intellectual Property I, L.P. Record information management based on self describing attributes
US11635907B2 (en) 2018-11-21 2023-04-25 At&T Intellectual Property I, L.P. Record information management based on self-describing attributes

Also Published As

Publication number Publication date
JP5697754B2 (en) 2015-04-08
EP2759942A4 (en) 2015-05-06
JPWO2013042218A1 (en) 2015-03-26
EP2759942A1 (en) 2014-07-30
CN103460197A (en) 2013-12-18
US20140040331A1 (en) 2014-02-06
WO2013042218A1 (en) 2013-03-28

Similar Documents

Publication Publication Date Title
US9396198B2 (en) Computer system, file management method and metadata server
US10430286B2 (en) Storage control device and storage system
EP1942414B1 (en) Snapshot system and method
JP4741371B2 (en) System, server apparatus, and snapshot format conversion method
US9529808B1 (en) Efficient and flexible organization and management of file metadata
US9880759B2 (en) Metadata for data storage array
US20060047926A1 (en) Managing multiple snapshot copies of data
US7698319B2 (en) Database system management method, database system, database device, and backup program
JP4267353B2 (en) Data migration support system and data migration support method
US20140297597A1 (en) Computer system and management method for the same
US7860909B2 (en) Search engine system using snapshot function of storage system
JP2010049488A (en) Storage system and data management method
JP2009205333A (en) Computer system, storage device, and data management method
US20070300034A1 (en) Virtual storage control apparatus
US9223811B2 (en) Creation and expiration of backup objects in block-level incremental-forever backup systems
KR20000022716A (en) Efficient volume copy using pre-configuration of log structured target storage
JP2008146408A (en) Data storage device, data rearrangement method for it, and program
US20140337594A1 (en) Systems and methods for collapsing a derivative version of a primary storage volume
WO2021169163A1 (en) File data access method and apparatus, and computer-readable storage medium
CN103197987A (en) Data backup method, data recovery method and cloud storage system
JPWO2007099636A1 (en) File system migration method, file system migration program, and file system migration apparatus
JP2008033527A (en) Storage device, disk device and data restoring method
US20120060005A1 (en) Techniques for copying on write
JP2005215940A (en) Storage system, server apparatus, and preceding copy data preparation method
US20070124366A1 (en) Storage control method for managing access environment enabling host to access data

Legal Events

Date Code Title Description
AS Assignment

Owner name: HITACHI, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TAKAOKA, NOBUMITSU;KODAMA, SHOJI;SIGNING DATES FROM 20130913 TO 20130918;REEL/FRAME:031416/0818

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200719